LogicHub launches MDR+ to provide flexible end-to-end detection and response
LogicHub, the provider of the industry’s most complete security automation solution, unveiled MDR+, its automation-driven Managed Detection and Response (MDR) solution. …
Enea Unified Data Manager: A cloud-native network function for 4G and 5G data management
Enea launched the Enea Unified Data Manager, a hardware-agnostic, cloud-native network function for 4G and 5G data management. The software performs the 3GPP functions of …
Keysight and Samsung collaborate to accelerate mobile operators’ deployment of 5G services
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced …
Sysnet secures funding to support growth and accelerate development of security product offerings
Sysnet Global Solutions, the leading provider of cyber security and compliance solutions operating in over 60 countries worldwide, announced it has secured a significant …
Nexthink appoints new CTO, two additional board members, and a new Chairman
Nexthink, the leader in digital experience management software, announced the appointment of a new Chief Technology Officer, two additional board members and a new Chairman to …
Michel Robert joins Epsilon as Group Chief Executive Officer
Epsilon, a global connectivity and communications service provider, has appointed Michel Robert as its Group Chief Executive Officer, with immediate effect. Bringing more than …
Emotet can spread to poorly secured Wi-Fi networks and computers on them
Here’s yet another reason to secure Wi-Fi networks and Windows user accounts with a strong enough password: researchers have spotted and analyzed a malware program that …
Honware: IoT honeypot for detecting zero-day exploits
Two researchers have created a solution that could help security researchers and IoT manufacturers with detecting zero-day exploits targeting internet-connected devices more …
Which vulnerabilities were most exploited by cybercriminals in 2019?
Which ten software vulnerabilities should you patch as soon as possible (if you haven’t already)? Table of top exploited CVEs between 2016 and 2019 (repeats are noted by …
The Goldilocks principle for zero trust fraud prevention
According to Wikipedia, “zero trust is an information security framework which states that organizations should not trust any entity inside or outside of their perimeter at …
Cyberattackers decreased their activity at the end of 2019, but only to change tactics
Attackers know that humans are still the weakest link. Across the board, malicious cyber-activity was down partly as a result of hectic holiday schedules and vacations with …
How IoT devices open a portal for chaos across the network
Shadow IoT devices pose a significant threat to enterprise networks, according to a new report from Infoblox. The report surveyed 2,650 IT professionals across the US, UK, …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month