Why Law Firm Breaches Destroy More than Data
In the wake of the Salesforce/Gainsight breach (kudos to Salesforce for transparently sharing indicators of compromise and updated progress on remediation), third-party cyber and exposure…
In the wake of the Salesforce/Gainsight breach (kudos to Salesforce for transparently sharing indicators of compromise and updated progress on remediation), third-party cyber and exposure…
For years, we’ve heard the same advice on how to unlock higher levels of cybersecurity greatness. We’re here to tell you that these well-meaning cybersecurity…
A new technique dubbed “Zombie ZIP” helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection…
Malformed ZIP Files Bypass Antivirus and EDR Detections A critical flaw in how antivirus and Endpoint Detection and Response (EDR) systems process archive files. Tracked…
A hacker using the alias “vibecodelegend” is claiming responsibility for breaching Cal AI, a smartphone application that uses artificial intelligence to track calories and nutritional…
Two zero-day flaws in the form of a denial of service (DoS) issue in .NET and an elevation of privilege (EoP) issues in SQL Server…
The Australian Competition and Consumer Commission (ACCC) has backed proposed new rules to make telcos show the geographic reach of their mobile networks to customers…
 The total market size (TAM) for AI is a combination of two (2) primary components: 1. The total cost of human workforces 2.…
Cybersecurity Awareness Month is here, and it’s an ideal time to reflect on whether your silly security mishaps have earned your photo a place on…
Cybersecurity Awareness Month is here, and it’s an ideal time to reflect on whether your silly security mishaps have earned your photo a place on…
A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as…
Cloudflare Pingora Vulnerabilities Cloudflare has released version 0.8.0 of its open-source Pingora framework to patch three critical vulnerabilities: CVE-2026-2833, CVE-2026-2835, and CVE-2026-2836. These flaws allow…