Product Spotlight RSA 2025 product preview Taelor Sutherland April 8, 2025 RSA 2025 takes place from April 28 through May 1 in San Francisco, California, bringing together cybersecurity leaders from all over the country. Security magazine highlights a few products from this year’s RSA exhibitors.Read More
Brand impersonation is 51% of browser phishing attempts Security Staff March 20, 2025 A recent Menlo Security report identifies key drivers behind the rise in browser-based attacks, including AI, PhaaS and zero-day vulnerabilities.Read More
3 Ivanti flaws added to CISA’s vulnerabilities catalogue Jordyn Alger March 14, 2025 CISA has announced five known exploited vulnerabilities now in its catalogue, three of which are Ivanti Endpoint Manager flaws. Read More
Enhance security posture: 4 key approaches to manage vulnerabilities Tsvi Korren March 13, 2025 Effective vulnerability management can help enhance security posture and reduce risk. Read More
96% of ransomware incidents involve data exfiltration Security Staff March 4, 2025 Malicious actors are shifting priorities, as 96% of ransomware incidents involve data exfiltration. Read More
MITRE Caldera security advisory warns of maximum severity flaw Jordyn Alger February 27, 2025 MITRE Caldera security advisory warns of maximum severity flaw, and experts weigh share their insights. Read More
Automation alone isn’t enough to patch vulnerabilities — Here’s why Dr. Deepak Kumar February 26, 2025 Organizations need to consider how they approach patching as vulnerabilities increase in volume and complexity.Read More
Open source software vulnerabilities found in 86% of codebases Jordyn Alger February 25, 2025 86% of codebases had open source software vulnerabilities while 81% had high- or critical-risk vulnerabilities.Read More
7-year-old vulnerability exploited in Salt Typhoon attack Jordyn Alger February 25, 2025 Security leaders discuss the 7-year-old vulnerability that was exploited in the Salt Typhoon attack. Read More
Cybersecurity risks organizations need to address this year Tim Eades February 24, 2025 Organizations that don’t pivot to an asset-centric security model risk more than exposure — they’re inviting catastrophic breaches.Read More