🔐 Security

Fake Booking.com emails and BSODs used to infect hospit...

Attackers are targeting the hospitality sector with fake Booking.com emails and ...

Exabeam helps teams assess their security posture aroun...

Exabeam is placing AI agent behavior analytics at the center of how security tea...

Hexnode XDR unifies detection, investigation, and respo...

Hexnode launched Hexnode XDR, a platform that unifies detection, investigation, ...

Hacker Conversations: Katie Paxton-Fear Talks Autism, M...

From dismantling online games as a child to uncovering real-world vulnerabilitie...

Cyber Risk Trends for 2026: Building Resilience, Not Ju...

We can’t outpace the adversary by trying to stop every attack, but we can outlas...

Dozens of Major Data Breaches Linked to Single Threat A...

The initial access broker (IAB) relies on credentials exfiltrated using informat...

NordVPN Denies Breach After Hacker Leaks Data | Curated...

The VPN company has conducted an investigation after a threat actor claimed to h...

Turning plain language into firewall rules | Curated b...

Natural language firewall configuration research shows how intent based policies...

The roles and challenges in moving to quantum-safe cryp...

Open source research maps governance roles in the quantum safe cryptography tran...

Cyberattack Unlikely in Communications Failure That Gro...

Flights across Greece were impacted for several hours after noise was reported o...

Brightspeed Investigating Cyberattack | Curated by Aler...

The hacking group Crimson Collective has claimed the theft of personal informati...

CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 En...

With 24 new vulnerabilities known to be exploited by ransomware groups, the list...

Kimwolf Android Botnet Grows Through Residential Proxy ...

The 2-million-device-strong botnet allows monetization through DDoS attacks, app...

Researcher Spotlights WhatsApp Metadata Leak as Meta Be...

WhatsApp device fingerprinting can be useful in the delivery of sophisticated sp...

Pharma's most underestimated cyber risk isn't a breach ...

Expert insights on pharma cyber risk as AI, vendor access and data misuse drive ...

AI security risks are also cultural and developmental ...

AI security governance risks grow as cultural bias and development gaps shape ho...