🔐 Security

ID-Pal upgrades ID-Detect, delivering protection agains...

ID-Pal has announced a major enhancement to its document-fraud detection feature...

Is your password manager truly GDPR compliant? | Curat...

Passwork offers the capabilities that security leaders look for when they need a...

Google Play Store’s privacy practices still confuse And...

Google Play Store privacy disclosures show data use and permissions, but it is u...

Palo Alto Networks to Acquire Observability Platform Ch...

The move to acquire Chronosphere is the latest of several acquisitions in recent...

Secure.com Raises $4.5 Million for Agentic Security | C...

The cybersecurity company has launched Digital Security Teammate (DST), AI agent...

Veeam Data Platform v13 strengthens AI-driven analysis ...

Veeam Data Platform v13 delivers AI-driven ransomware resilience, and recovery a...

The Cloudflare Outage May Be a Security Roadmap | Curat...

An intermittent outage at Cloudflare on Tuesday briefly knocked many of the Inte...

Mate Emerges From Stealth Mode With $15.5 Million in Se...

The cybersecurity startup will use the funds to expand its engineering team, ext...

Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing...

Threat actors are exploiting a two-year-old vulnerability in the Ray AI framewor...

Immersive unveils Dynamic Threat Range to transform cyb...

Immersive announced the general availability of Dynamic Threat Range, a new capa...

7-Zip vulnerability is being actively exploited, NHS En...

NHS England Digital has issued a warning about a 7-Zip vulnerability (CVE-2025-1...

Largest Azure DDoS Attack Powered by Aisuru Botnet | Cu...

Microsoft said the DDoS attack was aimed at an endpoint in Australia and reached...

Fortinet Discloses Second Exploited FortiWeb Zero-Day i...

An OS command injection flaw, the exploited zero-day allows attackers to execute...

Threat group reroutes software updates through hacked n...

PlushDaemon DNS hijacking shows how the group rerouted software updates through ...

Sophos adds Intelix threat intelligence to Microsoft Se...

Sophos integrates Intelix threat intelligence with Microsoft Security Copilot an...

The long conversations that reveal how scammers work |...

A new study shows how scammers work across long conversations, using trust build...