The ROI Problem in Attack Surface Management
Attack Surface Management (ASM) tools promise reduced risk. What they usually deliver is more information. Security teams deploy ASM, asset inventories grow, alerts start flowing,…
Attack Surface Management (ASM) tools promise reduced risk. What they usually deliver is more information. Security teams deploy ASM, asset inventories grow, alerts start flowing,…
ServiceNow has forecast that more than 1.03 million jobs will be created in the UAE by 2030 as artificial intelligence (AI) and digital technologies become…
This week, The Cyber Express takes a closer look at the events shaping the global cybersecurity landscape as we transition from 2025 to 2026. Throughout…
A critical security advisory warned of severe vulnerabilities in WHILL electric wheelchairs that could allow attackers to hijack the devices via Bluetooth remotely. The alert…
Cybersecurity researchers have identified a new variant of the Shai Hulud malware that reveals important insights into how threat actors are evolving their attack strategies.…
In 2025, protest policing in major US cities increasingly took on the character of a spectacle: overwhelming deployments, theatrical staging, and aggressive crowd-control tactics that…
French postal and banking services faced fresh disruptions on Thursday, January 1, 2026, following a cyberattack that temporarily rendered the websites and mobile applications of La Poste and La Banque Postale largely inaccessible, according…
IBM warns of critical API Connect bug enabling remote access Pierluigi Paganini January 02, 2026 IBM disclosed a critical API Connect flaw (CVE-2025-13915, CVSS 9.8)…
Cognizant Technology Solutions is facing multiple class-action lawsuits following a significant data breach at TriZetto Provider Solutions (TPS), its healthcare claims processing subsidiary. The lawsuits,…
This blog is part of a series where we highlight new or fast-evolving threats in consumer security. This one focuses on how AI is being…
Jan 02, 2026Ravie LakshmananCloud Security / Email Security Cybersecurity researchers have disclosed details of a phishing campaign that involves the attackers impersonating legitimate Google-generated messages…
After a decade of disappearing from the cybersecurity landscape, the Careto threat group, also known as “The Mask,” has resurfaced with sophisticated new attack methods…