
Palo Alto closes IBM QRadar SaaS buy, extends security partnership
Palo Alto Networks has closed the deal to acquire IBM’s QRadar software-as-a-service security intelligence platform. Now that the deal is […]

No evidence that TP-Link routers are a Chinese security threat
A US House committee on China’s request for a probe into an alleged security threat posed […]

Hackers are cloning YubiKeys via new side-channel exploit
Many enterprises rely on the YubiKey as a major part of their identity authentication strategy. It […]

New ALPHV-like ransomware targets VMware ESXi servers
Researchers at Trusec recently discovered a new ransomware-as-a-service group called Cicada3301. The gang provides its affiliates with a […]

‘Unusual’ Voldemort cyberespionage attack impersonates tax authorities
Researchers have identified an attack that impersonates tax authorities from several countries to compromise organizations and […]

Dutch regulator fines Clearview €30 million… or more
The Dutch Data Protection Authority, Autoriteit Persoonsgegevens, is the latest European regulator to crack down on […]

Attackers are exploiting vulnerabilities at a record pace—here’s what to do about it
“Another day, another vulnerability” is a familiar refrain among security teams worldwide. One of the most […]

Thousands of abandoned PyPI projects could be hijacked: Report
A vulnerability in abandoned Python open source repository projects could allow over 20,000 packages of code […]

Building a Culture of Email Security Awareness
Human error remains a significant risk for organizations when it comes to cyber threats. In fact, […]

6 things hackers know that they don’t want security pros to know that they know
Security professionals have good insights into the technical tactics, techniques, and procedures (TTPs) that threat actors […]