NVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code
02
May
2025

NVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code

NVIDIA has issued an urgent security advisory after discovering a significant vulnerability (CVE-2025-23254) in its popular TensorRT-LLM framework, urging all…

Naveen Goud
02
May
2025

India Takes Bold Steps to Protect Citizens from Cyber Fraud: The Introduction of New Domain Names for Banks

India, now officially the most populous country in the world after surpassing China, is taking a significant step to safeguard…

02
May
2025

People know password reuse is risky but keep doing it anyway

35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts,…

CISA Issues Alert on Actively Exploited Apache HTTP Server Escape Vulnerability
02
May
2025

CISA Issues Alert on Actively Exploited Apache HTTP Server Escape Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a newly discovered and actively exploited vulnerability…

AI and automation shift the cybersecurity balance toward attackers
02
May
2025

AI and automation shift the cybersecurity balance toward attackers

Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according…

How CISOs Can Leverage Threat Intelligence to Stay Proactive
02
May
2025

How CISOs Can Leverage Threat Intelligence to Stay Proactive

In today’s digital era, Chief Information Security Officers (CISOs) are under immense pressure to protect their organizations from increasingly sophisticated…

Phone theft is turning into a serious cybersecurity risk
02
May
2025

Phone theft is turning into a serious cybersecurity risk

Phone theft is a rising issue worldwide, and it’s more than just a property crime. It’s a serious cybersecurity threat….

Building a Resilient Cyber Defense
02
May
2025

Building a Resilient Cyber Defense

In today’s hyperconnected business environment, building a resilient cyber defense is crucial. Cyber threats have evolved into persistent and sophisticated…

Half of red flags in third-party deals never reach compliance teams
02
May
2025

Half of red flags in third-party deals never reach compliance teams

Third-party risk management (TPRM) is compromised in many organizations because those holding the relationship with the third-party (relationship owners) don’t…

How CISOs Can Successfully Lead Security Transformation in Hybrid Work Environments
02
May
2025

How CISOs Can Successfully Lead Security Transformation in Hybrid Work Environments

As organizations increasingly adopt hybrid work models, Chief Information Security Officers (CISOs) face new and complex challenges. The traditional boundaries…

Infosec products of the month: April 2025
02
May
2025

Infosec products of the month: April 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1touch.io, Abnormal AI, AppViewX, Arctic…

The Role Of MDR And XDR In Your Security Operations
02
May
2025

The Role Of MDR And XDR In Your Security Operations

In today’s rapidly evolving cyber threat landscape, organizations are increasingly challenged by the sophistication and frequency of attacks targeting their…