
Russia-linked PathWiper malware hits Ukrainian infrastructure
A destructive new malware, dubbed PathWiper, has struck Ukraine’s critical infrastructure, erasing data and disabling essential […]

Multicloud security automation is essential — but no silver bullet
Multicloud architectures are becoming more common across enterprises, as they enable IT leaders to strategically choose […]

Trump takes aim at Biden’s cyber executive order but leaves it largely untouched
The Trump administration issued an executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity […]

New AI tool targets critical hole in thousands of open source apps
Dutch and Iranian security researchers have created an automated genAI tool that can scan huge open […]

Chrome extension privacy promises undone by hardcoded secrets, leaky HTTP
Seemingly harmless Chrome extensions aimed at improving browser privacy and analytics could be inadvertently leaking API […]
What is Zero Trust Architecture? A Beginner’s Guide
As organizations growing more inclined towards digital transformation, the necessity for strong security measures has never […]

Unmasking the silent saboteur you didn’t know was running the show
You can have the best firewalls, airtight encryption and the latest SIEM tools. But if your […]

CISOs reposition their roles for business leadership
They may have the word “security” in their title, but the mandate for today’s CISOs is […]

Cloud assets have 115 vulnerabilities on average — some several years old
Companies are having a hard time keeping their cloud infrastructure secure and the race to adopt […]

Cyberbedrohungen erkennen und reagieren: Was NDR, EDR und XDR unterscheidet
Mit Hilfe von NDR, EDR und XDR können Unternehmen Cyberbedrohungen in ihrem Netzwerk aufspüren. Foto: alphaspirit.it […]