Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Latest News

More News

Latest Commentary

Jeffrey Wells

Visiting Fellow, National Security Institute at George Mason University's Antonin Scalia Law School

Steve Weber

Professor of the Graduate School, UC Berkeley School of Information

Roman Arutyunov

Co-Founder & Senior Vice President, Products, Xage Security

More Commentary
Legal Defense Fund Covers Crypto Research

The nonprofit Security Alliance is providing funds to protect security researchers who illegally access crypto assets with the aim of improving security.

Consumer Privacy Bill Fails in Vermont

Had the bill become a law, it would have given consumers the right to sue companies that violate their privacy.

How Cybersecurity Can Steer Organizations Toward Sustainability

By integrating environmental initiatives, social responsibility, and governance into their strategies, security helps advance ESG goals.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.

Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.

Multifactor Authentication Is Not Enough to Protect Cloud Data

Ticketmaster, Santander Bank, and other large firms have suffered data leaks from a large cloud-based service, underscoring that companies need to pay attention to authentication.

CHERI Alliance Aims to Secure Hardware Memory

The consortium of private companies and academia will focus on ways to protect hardware memory from attacks.

Chorology.ai Tackles Data Governance

The company has emerged from stealth with an AI-powered platform designed to give organizations visibility into unmanaged data.

30M Potentially Affected in Tickettek Australia Cloud Breach

In an incident with direct parallels to the recent Ticketmaster compromise, an Aussie live events giant says it was breached via a third-party cloud provider, as ShinyHunters takes credit.

Singapore Extradites Suspected Cybercrime Scammers from Malaysia

Cops decimate cybercrime infrastructure used to steal data from nearly 2,000 people in Singapore last year.

Bug Bounty Programs, Hacking Contests Power China's Cyber Offense

With the requirement that all vulnerabilities first get reported to the Chinese government, once-private vulnerability research has become a goldmine for China's offensive cybersecurity programs.

Breaking cybersecurity news, news analysis, commentary, and other content from around the world.