Betting (and Losing) the Farm on Traditional Cybersecurity
Standard SecOps training is no longer enough to tackle modern cybersecurity challenges. People need to develop non-traditional skills.
Your blog category
Standard SecOps training is no longer enough to tackle modern cybersecurity challenges. People need to develop non-traditional skills.
A patch bypass for a bug in the popular desktop emulator enables root-level privilege escalation and has no fix in sight.
This move comes less than a year after the United States banned Kaspersky products, out of the same fear that the company is under Russian government control.
Evolving threats and hybrid identity challenges keep Microsoft’s Active Directory at risk.
Confirmation by South Korea’s data protection agency that the AI chatbot sent data to TikTok’s Chinese parent company has spurred a ban in that nation, and is again is calling into question DeepSeek’s safety.
A new streaming series about a catastrophic, nationwide cyberattack against US critical infrastructure is about as believable as its main character: an honest, bipartisan, universally beloved politician.
Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025. A notable aspect of the stealer malware…
Only by addressing the inefficiencies of current naming conventions can we create a safer, more resilient landscape for all defenders.
Welcome to your weekly roundup of cyber news, where every headline gives you a peek into the world of online battles. This week, we look at a huge crypto theft, reveal some sneaky AI scam tricks, and discuss big changes in data protection. Let these stories spark your interest and help you understand the changing…
Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service (Cloud KMS) for software-based keys as a way to bulletproof encryption systems against the threat posed by cryptographically-relevant quantum computers. The feature, currently in preview, coexists with the National Institute of Standards and Technology’s (NIST) post-quantum cryptography (PQC)