In our last benchmarking post, Clarity in complexity: New insights for transparent email security,1 we shared why transparency matters more…
Are you using the same password you came up with on your very first login, however many years ago? You’re…
Loblaw Companies Limited (Loblaw), the largest food and pharmacy retailer in Canada, announced that hackers breached a portion of its…
Apple has backported patches for iOS 15 and 16 devices just this week, with iOS 15.8.7 and iOS 16.7.15 released…
Figure 11: Sysmon Event ID 10 – Process Access defendnot-loader Figure 12: Sysmon Event ID 10 – Process Access Taskmgr…
England Hockey, the governing body for field hockey in England, is investigating a potential data breach after the AiLock ransomware…
A coordinated international law enforcement operation has dismantled SocksEscort (socksescort.com), a large proxy service that routed cybercriminal traffic through thousands…
Ravie LakshmananMar 12, 2026Artificial Intelligence / Malware Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed…
Coles Group’s chief technology officer Mike Sackman is exiting the grocery retailer after a year spent in the role. A…
Critical flaw If Intune was the route to compromise, the first job for Stryker’s forensics team will be to work…
Every beep, ding, and red flag screams, “You’ve been compromised!” If you’re a security professional drowning in an endless sea…
Canadian business process outsourcing giant Telus Digital has confirmed it suffered a security incident after threat actors claimed to have stolen…











