WireTap Attack Breaks Intel SGX Security
A group of academic researchers from Georgia Tech and Purdue University has demonstrated that a passive DIMM interposer can be used to break Intel SGX’s…
A group of academic researchers from Georgia Tech and Purdue University has demonstrated that a passive DIMM interposer can be used to break Intel SGX’s…
As identity security becomes increasingly critical in cybersecurity, the focus has shifted from safeguarding human identities to protecting Non-Human Identities (NHIs)—such as API keys, service accounts,…
CEO Joe Levy explains how Sophos defeats cyberattacks with an adaptive AI-native open platform and unmatched security expertise in a new video on the award-winning Cybercrime Magazine YouTube channel.…
Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of…
Canadian airline WestJet is notifying roughly 1.2 million people that their personal information was stolen in a June 2025 cyberattack. The Alberta, Canada-based company was…
The government has unveiled 14 Regional Tech Booster projects as part of its £1m programme to provide businesses and entrepreneurs with targeted training and expert…
Dealership software company Motility Software Solutions is notifying over 766,000 people that their personal information was compromised in a ransomware attack. A provider of software…
An extortion group calling itself the Crimson Collective claims to have breached Red Hat’s private GitHub repositories, stealing nearly 570GB of compressed data across 28,000…
Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent, many irrelevant. The job is…
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories Pierluigi Paganini October 02, 2025 The cybercrime group calling itself the Crimson Collective…
For this Cybersecurity Awareness Month, we thought it important to draw attention to some of the most common and dangerous API vulnerabilities. This week, we’re…
Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for the Signal and ToTok messaging apps…