Innovator Spotlight: NetBrain
04
Sep
2025

Innovator Spotlight: NetBrain – Cyber Defense Magazine

Network Visibility: The Silent Guardian of Cybersecurity Network complexity is killing enterprise security teams. Buried under mountains of configuration data,…

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn
04
Sep
2025

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

Sextortion-based hacking, which hijacks a victim’s webcam or blackmails them with nudes they’re tricked or coerced into sharing, has long…

Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
04
Sep
2025

Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers

Sep 03, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have discovered two new malicious packages on the npm registry that…

Innovator Spotlight: OPSWAT
04
Sep
2025

Innovator Spotlight: OPSWAT – Cyber Defense Magazine

Zero Trust: The Unsung Hero of Cybersecurity Cybersecurity professionals are drowning in complexity. Acronyms fly like digital confetti, vendors promise…

Cato Networks acquires AI security startup Aim Security
03
Sep
2025

Cato Networks acquires AI security startup Aim Security

Israeli cybersecurity company Cato Networks has acquired AI security startup Aim Security in its first ever acquisition, reflecting the broader…

CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access
03
Sep
2025

CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning about a critical vulnerability in SunPower PVS6…

Innovator Spotlight: Adaptive Security
03
Sep
2025

Innovator Spotlight: Adaptive Security – Cyber Defense Magazine

The AI Threat Landscape: How Adaptive Security is Redefining Cyber Defense Cybersecurity professionals are facing an unprecedented challenge. The rise…

CISOs: Don't block AI, but adopt it with eyes wide open
03
Sep
2025

Bridging the SLA gap: A guide to managing cloud provider risk

As organisations increasingly rely on cloud services to drive innovation and operational efficiency, chief information security officers (CISOs) face a…

Researchers detail novel cryptomining attack
03
Sep
2025

Researchers detail novel cryptomining attack

Researchers at cyber security vendor Darktrace have unearthed what they say is the first documented case of NBMiner cryptomining malware…

Crooks turn HexStrike AI into a weapon for fresh vulnerabilities
03
Sep
2025

Crooks turn HexStrike AI into a weapon for fresh vulnerabilities

Crooks turn HexStrike AI into a weapon for fresh vulnerabilities Pierluigi Paganini September 03, 2025 Threat actors abuse HexStrike AI,…

How to do Bane's Voice
03
Sep
2025

How to do Bane’s Voice

Bane during the famous underground fight scene (click for full size) Not my normal type of content, obviously, but there’s…

CISA guide seeks a unified approach to software ‘ingredients lists’
03
Sep
2025

CISA guide seeks a unified approach to software ‘ingredients lists’

Compiling an “ingredients list” for software can help organizations reduce cyber risks, avoid fines and save time, among other benefits,…