The cyber perimeter was never dead. We just abandoned it.
Institutional failure: The place-to-stand problem The fallacy of the faded perimeter has taken hold in part due to a shift in security strategy due to…
Institutional failure: The place-to-stand problem The fallacy of the faded perimeter has taken hold in part due to a shift in security strategy due to…
In our last benchmarking post, Clarity in complexity: New insights for transparent email security,1 we shared why transparency matters more than ever in email security…
When you’re performing intrusion analysis, it’s easy to get disoriented. There are usually hundreds of Windows event IDs to sort through, generated by potentially thousands…
Broadcom’s acquisition of VMware in 2023 set off a wave of migrations that shows no signs of subsiding. But moving from VMware to another hypervisor…
Microsoft has officially acknowledged a critical bug affecting Windows 11 users on certain Samsung devices, in which the system drive (C:) becomes completely inaccessible after…
Menlo Park, California, USA, March 13th, 2026, CyberNewswire AI-HealthTech innovator Humata Health announced that it is partnering with AccuKnox, a leader in Code to Cognition…
The Canadian telecoms giant Telus is currently picking up the pieces after a massive security breach at its subsidiary, Telus Digital. The company, which provides…
Here’s a look at the most interesting products from the past week, featuring releases from Binary Defense, Mend.io, OPSWAT, Singulr AI, SOC Prime, Terra Security,…
A vulnerability in Android devices can allow attackers to gain access to a phone in less than a minute. The vulnerability, tracked as CVE-2026-20435, affects…
Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based…
MPs have called for “urgent legislation” to overturn Post Office convictions based on its Capture software and warned that “unsafe” convictions based on other pre-Horizon…
The Unique Identification Authority of India has introduced a structured UIDAI bug bounty program designed to strengthen the cybersecurity of India’s Aadhaar ecosystem. The initiative…