Gremlin, the proactive reliability platform, launched Disaster Recovery Testing: a new product built to safely and efficiently test zone, region,…
The construction industry has long been associated with delays, cost overruns and fragmented ways of working. Despite managing trillions of…
Governments should work closely with the private sector when designing and detailing their national cybersecurity strategies, a prominent think tank…
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious payloads for…
A sophisticated phishing campaign targeting macOS users has emerged, using fake compliance emails as a delivery mechanism for advanced malware….
A complex espionage campaign attributed to Chinese APT group Lotus Blossom, active since 2009. The investigation uncovered a sophisticated compromise…
Russian state-sponsored hackers Fancy Bear (aka APT 28) are exploiting CVE-2026-21509, a Microsoft Office vulnerability for which Microsoft released an…
Ravie LakshmananFeb 03, 2026Open Source / Vulnerability Threat actors have been observed exploiting a critical security flaw impacting the Metro…
CGI’s artificial intelligence (AI) head knows his current job title won’t exist in the future, when AI is established in…
By Ido Shlomo, CTO and Co-Founder, Token Security Security leaders have spent years hardening identity controls for employees and service…
There is a comforting illusion in cybersecurity leadership: when things get noisy, you add more people. More analysts. More shifts….
Apache Syncope, a popular open-source identity and access management platform, has disclosed a critical XML External Entity (XXE) vulnerability in…
