
How ‘Plague’ infiltrated Linux systems without leaving a trace
Security researchers have discovered an unusually evasive Linux backdoor, undetected even by VirusTotal, compromising systems as […]

Ransomware attacks: The evolving extortion threat to US financial institutions
Before sunrise on a chilly November morning, I got the kind of call no security leader […]

CISA releases Thorium, an open-source, scalable platform for malware analysis
The US Cybersecurity and Infrastructure Security Agency (CISA) has released Thorium, a high-throughput open-source platform for […]

MCP: securing the backbone of Agentic AI
The model context protocol (MCP) was only introduced at the end of 2024, but the technological […]
Open Banking: Balancing Innovation & Risk
With the changing needs of customers and the emergence of an increasingly digital financial service industry, […]

CrowdStrike: A new era of cyberthreats from sophisticated threat actors is here
CISOs and their teams are entering a “new era” of cyberthreats characterized by sophisticated threat actors […]

6 things keeping CISOs up at night
CISOs have a lot on their minds, from team’s burn out, AI risks to the pressure […]

Der Kaufratgeber für Breach & Attack Simulation Tools
Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman […]

How NDR Identifies Malware Through Traffic Analysis Patterns and Behaviors
Massive volumes of network traffic flow across your environment every second, and traditional security tools can […]

Cybercrooks faked Microsoft OAuth apps for MFA phishing
Threat actors have cooked up a clever way to slip past multifactor authentication (MFA), tricking users […]