The Ultimate Guide to Cybersecurity for Small Businesses and Consumers
28
Jan
2025

The Ultimate Guide to Cybersecurity for Small Businesses and Consumers

In our hyper-connected world, cybersecurity is more critical than ever. With increasing reliance on digital technologies, individuals and organizations face a growing…

BackBox releases Network Cyber Resilience Platform
28
Jan
2025

BackBox releases Network Cyber Resilience Platform

BackBox launched Network Cyber Resilience Platform. With business productivity at risk due to the complexity of managing too many tools,…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
28
Jan
2025

The new rules for AI and encrypted messaging, with Mallory Knodel (Lock and Code S06E01)

This week on the Lock and Code podcast… The era of artificial intelligence everything is here, and with it, come…

Hackerone logo
28
Jan
2025

How HackerOne Reinvented Security for Developers

Workflow Integration Code security tools need to be accessible in the toolkit developers already use and in the workflows they…

Microsoft Edge
28
Jan
2025

Microsoft tests Edge Scareware Blocker to block tech support scams

Microsoft has started testing a new “scareware blocker” feature for the Edge web browser on Windows PCs, which uses machine…

Lumma Stealer Found in Fake Crypto Tools and Game Mods on GitHub
28
Jan
2025

Lumma Stealer Found in Fake Crypto Tools and Game Mods on GitHub

McAfee Labs uncovers malicious GitHub repositories distributing Lumma Stealer malware disguised as game hacks and cracked software. Learn how to…

Lumma Stealer Found in Fake Crypto Tools and Game Mods on GitHub
28
Jan
2025

Lumma Stealer Found in Fake Crypto Tools and Game Mods on GitHub

McAfee Labs uncovers malicious GitHub repositories distributing Lumma Stealer malware disguised as game hacks and cracked software. Learn how to…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
28
Jan
2025

Three privacy rules for 2025 (Lock and Code S06E02)

This week on the Lock and Code podcast… It’s Data Privacy Week right now, and that means, for the most…

ForensicScope Regula 4125 detects counterfeit documents
28
Jan
2025

ForensicScope Regula 4125 detects counterfeit documents

Regula has launched the portable and autonomous ForensicScope Regula 4125. The new device enables ID verification in any place and…

patched Apple
28
Jan
2025

Apple users: Update your devices now to patch zero-day vulnerability

Apple has released a host of security updates across many devices, including for a zero-day bug which is being actively…

Hackerone logo
28
Jan
2025

2024 Cybersecurity Budget Planning: Budgeting for VDPs

New and Upcoming Public Policy on VDPs VDPs are in the midst of a shift from an industry best practice…

The complexities of scaling AppSec teams and how to address them in 2025 | Blog
28
Jan
2025

The complexities of scaling AppSec teams and how to address them in 2025 | Blog

Tom Ryder | 28 January 2025 at 13:08 UTC Your organization’s application portfolio is growing and so are the risks….