Category: ITSecurityGuru

Check Point to Acquire Veriti to Transform Threat Exposure Management
28
May
2025

Check Point to Acquire Veriti to Transform Threat Exposure Management

Check Point Software has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure…

Finding the right balance between 'vibe coders' and security
22
May
2025

Finding the right balance between ‘vibe coders’ and security

In today’s digital workplaces, more employees are building their own applications by generating code using Low Code No Code (LCNC),…

Samsung MagicINFO Server Flaw Now Actively Exploited – Huntress Uncovers Real-World Attacks
21
May
2025

Samsung MagicINFO Server Flaw Now Actively Exploited – Huntress Uncovers Real-World Attacks

Cybersecurity researchers at Huntress have issued a warning after confirming active exploitation of a critical remote code execution (RCE) vulnerability…

How To Secure Digital Wallets from Phishing Attacks
21
May
2025

How To Secure Digital Wallets from Phishing Attacks

Digital wallets have become increasingly popular, offering users an easy way to make payments, store cryptocurrencies, and manage their money….

What Should You Consider When Choosing an AI Penetration Testing Company?
21
May
2025

What Should You Consider When Choosing an AI Penetration Testing Company?

AI is truly making its way into every aspect of business operations, and rightly so. When we proactively test systems…

WatchGuard transitions new CEO - IT Security Guru
21
May
2025

WatchGuard transitions new CEO – IT Security Guru

WatchGuard® Technologies, a provider of unified cybersecurity for managed service providers (MSPs), today announced a planned leadership transition. After a…

Exploring CNAPP Options for Cloud Security in 2025
21
May
2025

Exploring CNAPP Options for Cloud Security in 2025

Cloud adoption continues to rise, and with it comes increased complexity. Organizations use multiple cloud platforms, creating challenges that traditional…

AI Agents: Transformative or Turbulent?
21
May
2025

AI Agents: Transformative or Turbulent?

Described as revolutionary and disruptive, AI agents are the new cornerstone of innovation in 2025. But as with any technology…

ENISA Launches European Vulnerability Database to Bolster EU Cyber Resilience
21
May
2025

ENISA Launches European Vulnerability Database to Bolster EU Cyber Resilience

The European Union Agency for Cybersecurity (ENISA) has unveiled the European Vulnerability Database (EUVD), a strategic move designed to enhance…

Thoughtworks and ACDS Partner to Advance Cybersecurity Solutions
21
May
2025

Salt Security Partners With Wiz, Combines Cloud and API Security

API security orgnanisation Salt Security has announced its expanded partnership and new integration with Wiz, the leader in cloud security….

Keeper Security appoints new CISO
21
May
2025

Keeper Security appoints new CISO

Keeper Security, the cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets…

How Compliance Training Software Protects Your Business from Risk
13
May
2025

How Compliance Training Software Protects Your Business from Risk

The modern business environment exposes organizations to a range of challenges that affect business operations, hence the need for robust…