
Chase CISO condemns the security of the industry’s SaaS offerings
The JPMorganChase chief information security officer (CISO) publicly criticized software as a service (SaaS) cybersecurity efforts […]

Alert to Kali Linux admins: Get the new signing key or no distro updates for you
Kali Linux administrators who haven’t manually updated the signing key for the operating system’s repository are […]
The Role of Data Transfer Monitoring with DLP in Tracking Internal & External Data Movement
Data Loss Prevention (DLP) tools are crucial for protecting sensitive information as it moves within and […]

Enterprise-specific zero-day exploits on the rise, Google warns
Zero-day vulnerabilities may have declined in 2024, but the number of flaws in enterprise products that […]

Huntress expands ITDR capabilities to combat credential theft and BEC
Cybersecurity outfit Huntress, known for its threat detection solutions, has announced expanding identity-specific offerings–including protection from […]

Palo Alto Networks to buy Protect AI, strengthen AI security platform
Palo Alto Networks Monday announced plans to acquire AI security platform vendor Protect AI in a […]

Cybersecurity leaders decry ‘political persecution’ of Chris Krebs in a letter to the President
Over 40 leading cybersecurity professionals and infosec experts have signed an open letter condemning the political […]

Brocade Fabric OS flaw could allow code injection attacks
A high severity flaw affecting Broadcom’s Brocade Fabric OS (FOS) has allowed attackers to run arbitrary […]

Cyberattacke auf berlin.de
width=”2490″ height=”1400″ sizes=”(max-width: 2490px) 100vw, 2490px”>Auf Berlins Info- und Serviceportal berlin.de ging Ende April 2025 nichts […]

The state of intrusions: Stolen credentials and perimeter exploits on the rise, as phishing wanes
CISOs seeking insights into the latest cyberattack trends should note that cybercriminals’ initial access methods appear […]