CISOs rethink their data protection strategies
For example, many organizations do a poor job at data classification and data tagging, two vital steps for ensuring adequate security controls are applied to…
For example, many organizations do a poor job at data classification and data tagging, two vital steps for ensuring adequate security controls are applied to…
The Council of the European Union formally approved a set of conclusions aimed at beefing up the EU’s capacity to prevent, deter and respond to…
In this LABScon 25 talk, Andrew MacPherson dives deep into the high-stakes world of crypto crime, which has amassed approximately $9 billion in illicit funds.…
Running a business, big or small, isn’t easy. Some challenges you’ll see coming, while others will catch you completely off guard. One day, everything’s running…
Episode Summary: Vanta CMO Scott Holden joins Gianna to talk about how the company is expanding beyond automated SOC 2 compliance and positioning Vanta as…
The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, repositories, and extensions on GitHub, npm, and VSCode/OpenVSX extensions. Researchers…
Ubuntu Desktop Systems Vulnerability A Local Privilege Escalation (LPE) vulnerability in default installations of Ubuntu Desktop 24.04 and later allows an unprivileged local attacker to…
A newly discovered malware campaign is exploiting user trust in Telegram by distributing a trojanized installer through a typosquatted website, telegrgam[.]com. The site closely mimics…
New York, United States, March 17th, 2026, CyberNewswire Unleash AI adoption securely: discover, attribute, and govern AI agents throughout the enterprise Orchid Security, the company…
Google just dropped a bombshell for app developers with the latest version of its Android mobile operating system. The company can now prevent apps from…
Ravie LakshmananMar 17, 2026Threat Intelligence / Endpoint Security North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a…
Artificial intelligence (AI)-powered tools developed by Israeli digital intelligence company Cellebrite will give police investigators the capability to interrogate call records, text messages, images and…