MiniTool Power Data Recovery 9.0: Improved scanning speed and data recovery results
MiniTool Software has released the latest MiniTool Power Data Recovery 9.0, aiming to make specific location recovery available and save the recovery time. The new features …
Leading tech companies certify IoT devices via ioXt Alliance
The ioXt Alliance announced that major technology companies and manufacturers including Google, T-Mobile, Silicon Labs and more, certified a wide range of devices through the …
Deep Instinct contracts with T-Systems to continue expansion into EMEA
Deep Instinct is continuing its strategic expansion into EMEA, contracting with T-Systems (Poland) to utilize and distribute Deep Instinct’s protection to its customers. Deep …
IRONSCALES raises $8M to support email security research and development, accelerate growth
IRONSCALES announced it has closed an $8 million Series B extension led by Chicago-based venture and growth capital firm Jump Capital. The additional funding will add to the …
LitLingo raises $2M to expand its product and engineering teams, accelerate growth
LitLingo Technologies announces that it has closed a $2 million seed round led by LiveOak Venture Partners. Krishna Srinivasan, Founding Partner at LiveOak, will join the …
Facebook open-sources a static analyzer for Python code
Need a tool to check your Python-based applications for security issues? Facebook has open-sourced Pysa (Python Static Analyzer), a tool that looks at how data flows through …
Critical ManageEngine ADSelfService Plus RCE flaw patched
A critical vulnerability (CVE-2020-11552) in ManageEngine ADSelfService Plus, an Active Directory password-reset solution, could allow attackers to remotely execute commands …
The precision of security undermined by a failure to correlate
If Paul Newman’s Cool Hand Luke character were to address the security industry, his opening line would likely be: “What we have here is a failure to correlate.” Today, one of …
Internal investigations are changing in the age of COVID-19
Internal investigations in corporations are typically conducted by the human resources (HR) department, internal compliance teams, and/or the IT department. Some cases may …
Why the rapid transition to cloud demands that DevOps shift left
To accommodate remote work policies amid COVID-19, companies have increasingly adopted the public cloud to support off-site business continuity. A MarketsandMarkets analysis …
6,600 organizations bombarded with 100,000+ BEC attacks
Cybercriminals are increasingly registering accounts with legitimate services, such as Gmail and AOL, to use them in impersonation and BEC attacks, according to Barracuda …
DevOps is transforming database development in the healthcare sector
As IT teams across the country struggle with smaller budgets and staffing shortages, every industry has seen a rising demand for standardized process and automation to quickly …
Featured news
Resources
Don't miss
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable