Don’t Get Security from Your RMM Provider: Know the Risks
Imagine you’re playing in the big game. With only a minute left in the fourth quarter your team is one yard away from sealing the…
Imagine you’re playing in the big game. With only a minute left in the fourth quarter your team is one yard away from sealing the…
Compute power is growing at an extraordinary pace. The AI surge has driven massive investment in GPUs and specialized ‘accelerators’, with vendors building increasingly powerful…
A network-level disruption struck multiple Microsoft 365 services on Wednesday evening, knocking out or degrading access to Exchange Online, Microsoft Teams, and the broader Microsoft…
Salt Security has released its 1H 2026 State of AI and API Security: Navigating the Agentic Era report, revealing a widening gap between the rapid…
Anthropic recently unveiled Claude Mythos Preview, a groundbreaking general-purpose language model demonstrating an unprecedented, emergent ability to autonomously discover and exploit zero-day vulnerabilities. In response…
Why did Cybercrime Magazine meet up with Charlie Thomas, CEO at Mitiga, at RSAC Conference 2026? Because attackers will get in. Cloud, SaaS, AI, and identity sprawl…
North Korean hackers spent weeks socially engineering an Axios maintainer through a fake Slack workspace, a cloned company identity, and a fabricated Microsoft Teams call…
Did you know you can be profiled based on the browser extensions you use? Advertisers can detect which extensions are installed and use that to…
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams,…
Microsoft Azure is refusing capacity to cloud customers in the company’s UK South (UKS) region, with issues around the availability of Azure virtual machines (VMs)…
A newly uncovered zero-day attack targeting Adobe Reader has raised alarms across enterprise security teams, as researchers identified an exploit chain that bypasses traditional detection…
The Russian-linked threat group APT28 has continued to leverage vulnerable network devices to carry out large-scale DNS hijacking campaigns, enabling adversary-in-the-middle attacks. Recent developments show that these…