Why an Effective Detection and Response Strategy Must Focus on Very Attacked People (VAPs)
When a business is considering its vulnerabilities and turns to consider which of its people might pose the most of...
Read more →When a business is considering its vulnerabilities and turns to consider which of its people might pose the most of...
Read more →A sophisticated new malware framework named CastleBot has emerged as a significant threat to cybersecurity, operating as a Malware-as-a-Service (MaaS)...
Read more →The Trump administration’s radical changes to United States fiscal policy, foreign relations, and global strategy—combined with mass firings across the...
Read more →French firm Bouygues Telecom suffered a data breach impacting 6.4M customers Pierluigi Paganini August 08, 2025 Bouygues Telecom suffered a...
Read more →A new documentary series about cybercrime airing next month on HBO Max features interviews with Yours Truly. The four-part series...
Read more →The Pentagon’s two-year public competition to spur the development of cyber-reasoning systems that use large language models to autonomously find...
Read more →A sophisticated new variant of the DarkCloud information stealer has emerged in the cyberthreat landscape, targeting Windows users through carefully...
Read more →A new documentary series about cybercrime airing next month on HBO Max features interviews with Yours Truly. The four-part series...
Read more →OpenAI’s CEO, Sam Altman, overpromised on GPT-5, and real-life results are underwhelming, but it looks like a new update is...
Read more →Critical security flaws in Axis Communications’ surveillance infrastructure have left over 6,500 organizations worldwide vulnerable to sophisticated cyberattacks, with potential...
Read more →A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. The...
Read more →Zhou added in his statement that Securam will be fixing the vulnerabilities Omo and Rowley found in future models of...
Read more →