The Role of Enterprise Email Security in Modern Cybersecurity Strategies
Email has always been a double-edged sword in the world of business. On one hand, it’s the fastest, most reliable way to communicate across teams,…
Email has always been a double-edged sword in the world of business. On one hand, it’s the fastest, most reliable way to communicate across teams,…
The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers to publish malicious versions of the popular…
UL Member Content Table of Contents As with every piece in this series, I won’t pretend I can see what’s coming. Because I can’t—and nobody…
Over 1,400 developers discovered today that a malicious post-install script in the popular NX build kit silently created a repository named s1ngularity-repository in their GitHub…
Akamai researchers evaluated Microsoft’s patch for the BadSuccessor vulnerability (CVE-2025-53779) to determine its scope and limitations. While the update effectively blocks the original direct escalation…
Aug 28, 2025Ravie LakshmananArtificial Intelligence / Malware The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions…
Chinese technology companies have been linked to targeting governments and critical networks with malicious cyber attacks since 2021. Working with 12 international partners, GCHQ’s National…
A coalition of cybersecurity and intelligence agencies from across the globe, including the United States National Security Agency (NSA), has issued a joint advisory revealing…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert after detecting active exploitation of a critical zero-day remote code execution (RCE) vulnerability…
The U.S. State Department in collaboration with Japan, South Korea, and private cybersecurity partners met in Tokyo, last week, to draw plans for combating North…
China linked UNC6384 targeted diplomats by hijacking web traffic Pierluigi Paganini August 27, 2025 The China-linked APT group UNC6384 targeted diplomats by hijacking web traffic…
I clearly see the merits of both sides, similar to the end-to-end encryption discussion. The last few years have given me some clarity on where…