Sponsored By
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Latest News

More News
Redesigning the Network to Fend Off Living-Off-the-Land Tactics

The growing threat of living-off-the-land tactics requires a rethink of network traffic visibility to prevent these types of attacks.

Privacy Beats Ransomware as Top Insurance Concern

Despite ransomware losses remaining high, privacy violations have quickly risen to second in a list of expected cyber insurance claims costs.

Library Cyber Defenses Are Falling Down

Librarians are being asked to defend themselves online against sophisticated and complex attacks. It's an unequal fight.

Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.

Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.

Apple Beefs Up iMessage With Quantum-Resistant Encryption

The revamped iMessage app uses Apple's new PQ3 post-quantum cryptographic protocol, which its engineers say will make it the most secure messaging app — but Signal's president begs to differ.

Insurers Use Claims Data to Recommend Cybersecurity Technologies

Policy holders using certain technologies — such as managed detection and response (MDR) services, Google Workspace, and email security gateways — gain premium discounts from cyber insurers.

AI-Generated Patches Could Ease Developer, Operations Workload

Using information from a common technique for finding vulnerabilities, Google's Gemini LLM can produce patches for 15% of such bugs. And it's not the only way to help automate bug fixing.

China Launches New Cyber-Defense Plan for Industrial Networks

Government will provide additional cybersecurity training and recruit additional cybersecurity talent in an effort to better secure its industrial sector from attacks.

UAC-0184 Targets Ukrainian Entity in Finland With Remcos RAT

The IDAT Loader malware was used to deliver the cyber espionage tool, employing steganography, a seldom-seen technique in real-world attacks.

Gulf Region Accelerates Adoption of Zero Trust

United Arab Emirates will likely be one of the first in the region to implement zero-trust security due to its heavy adoption of cloud technologies.

Breaking cybersecurity news, news analysis, commentary, and other content from around the world.

Partner Perspectives

More Partner Perspectives