Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks Jordyn Alger April 25, 2025 Verizon Business has released its 2025 Data Breach Investigations Report. Read More
Devices exposed to remote hacking via Erlang/OTP SSH vulnerability Jordyn Alger April 21, 2025 The Erlang/Open Telecom Platform (OTP) SSH implementation has a critical security vulnerability.Read More
MITRE support extended 11 more months, yet uncertainty remains Security Staff April 17, 2025 Although MITRE’s contact has been extended for 11 more months, uncertainty remains un the cyber community. Read More
MITRE set to lose funding today, CISA intervenes Jordyn Alger April 16, 2025 CISA has extended MITRE’s funding, and security leaders are sharing their thoughts. Read More
Incomplete NVIDIA patch could leave AI infrastructure and data at risk Jordyn Alger April 15, 2025 An incomplete NVIDIA patch could leave AI infrastructure and data at risk. Security leaders share their insights. Read More
Product Spotlight RSA 2025 product preview Taelor Sutherland April 8, 2025 RSA 2025 takes place from April 28 through May 1 in San Francisco, California, bringing together cybersecurity leaders from all over the country. Security magazine highlights a few products from this year’s RSA exhibitors.Read More
Brand impersonation is 51% of browser phishing attempts Security Staff March 20, 2025 A recent Menlo Security report identifies key drivers behind the rise in browser-based attacks, including AI, PhaaS and zero-day vulnerabilities.Read More
3 Ivanti flaws added to CISA’s vulnerabilities catalogue Jordyn Alger March 14, 2025 CISA has announced five known exploited vulnerabilities now in its catalogue, three of which are Ivanti Endpoint Manager flaws. Read More
Enhance security posture: 4 key approaches to manage vulnerabilities Tsvi Korren March 13, 2025 Effective vulnerability management can help enhance security posture and reduce risk. Read More
96% of ransomware incidents involve data exfiltration Security Staff March 4, 2025 Malicious actors are shifting priorities, as 96% of ransomware incidents involve data exfiltration. Read More