
AI-SPM buyer’s guide: 9 security posture management tools to protect your AI infrastructure
Widespread adoption of generative AI across businesses has increased the need for contingencies, including AI security […]

Entro Security Labs Releases Non-Human Identities Research Security Advisory
Analysis of millions of real-world NHI secrets by Entro Security Labs reveals widespread, significant risks, emphasizes […]

Preparing for the next big cyber threat
In an increasingly uncertain world, with internal risks and external social, economic and geopolitical threats to […]

Microsoft summit plots end of kernel access for EDR security clients
Microsoft has dropped heavy hints that change is coming to the way security products interact with […]

Port of Seattle says August cyberattack was Rhysida ransomware
The Port of Seattle has confirmed that Rhysida ransomware was used in a cyberattack that took […]

Patch management: A dull IT pain that won’t go away
Enterprise security patching remains a challenge despite improvements in both vulnerability assessment and update technology. Competing […]

Top 10 ransomware groups to watch
The ransomware landscape has seen a lot of fragmentation over the past couple of years with […]

Newly patched Ivanti CSA flaw under active exploitation
IT management solutions provider Ivanti confirmed that a high-severity flaw patched this week in an older […]

New cryptomining campaign infects WebLogic servers with Hadooken malware
A new attack campaign compromises misconfigured Oracle WebLogic servers and deploys a backdoor program called Hadooken […]

Protecting Sensitive Data with Office 365 Data Loss Prevention
Mastering Microsoft 365 Data Loss Prevention: Setup, Policies, Benefits, and More! Managing and Safeguarding data is […]