
Tricking the bad guys: realism and robustness are crucial to deception operations
Longtime cybersecurity practitioners might recall the early guidance manuals published by the National Security Agency (NSA) […]

GDPR fines hit €1.2 billion in 2024 on 8.3% more breach reports
Corporation violations of GDPR rules resulted in total fines of €1.2 billion in 2024, according to […]

Prävention gegen Black Basta
Ein lückenloser Grundschutz ist im Kampf gegen Ransomware die halbe Miete. ImageFlow – Shutterstock.com Seit ihrem […]

AMD’s unpatched chip microcode glitch may require extreme measures by CISOs
AMD has had to confirm the existence of a major cybersecurity problem in its chip microcode […]

Warning to FortiGate admins: You need to run a compromise assessment now
Network administrators with Fortinet’s FortiGate next generation firewall in their IT environments are being warned to […]

Palo Alto Networks firewalls have UEFI flaws, Secure Boot bypasses
Researchers have discovered that next-generation firewalls from Palo Alto Networks contain years-old known vulnerabilities in their […]

Automating endpoint management doesn’t mean ceding control
Beset with cybersecurity risks, compliance regimes, and digital experience challenges, enterprises need to move toward autonomous […]

Cisco patches antivirus decommissioning bug as exploit code surfaces
Cisco has patched a denial-of-service (DoS) vulnerability affecting its open-source antivirus software toolkit, ClamAV, which already […]

10 top XDR tools and how to evaluate them
Little in the modern IT world lends itself to manual or siloed management, and this is […]

Python administrator moves to improve software security
The administrators of the Python Package Index (PyPI) have begun an effort to improve the hundreds […]