October 2025
 
                                The power grid is getting old, and so is the cybersecurity protecting it
Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, …
 
                                LevelBlue acquires Cybereason to expand global MDR, XDR, and threat response leadership
LevelBlue has signed a definitive agreement to acquire Cybereason, a cybersecurity firm known for its Extended Detection and Response (XDR) platform, threat intelligence team, …
 
                                Regula simplifies identity verification with its new all-in-one IDV Platform
Regula has launched its Regula IDV Platform. This ready-to-use orchestration solution is designed to replace fragmented identity verification and management systems with a …
 
                                Picus Security uses AI to turn threat intelligence into attack simulations
Picus Security launched new AI-powered breach and attack simulation (BAS) capabilities within the Picus Security Validation Platform. This introduces a new level of speed and …
 
                                NetApp strengthens its enterprise data platform with new AI-focused innovations
NetApp unveiled new products, strengthening its enterprise-grade data platform for AI innovation. The new NetApp AFX decouples performance and capacity with a disaggregated …
 
                                Visa’s Trusted Agent Protocol sets new standard for secure agentic transactions
Visa unveiled the Trusted Agent Protocol, establishing a foundational framework for agentic commerce that enables secure communication between AI agents and merchants during …
 
                                What if your privacy tools could learn as they go?
A new academic study proposes a way to design privacy mechanisms that can make use of prior knowledge about how data is distributed, even when that information is incomplete. …
 
                                The solar power boom opened a backdoor for cybercriminals
Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service and undermining confidence in …
 
                                Security validation: The key to maximizing ROI from security investments
Every sizable organization invests heavily in firewalls, SIEMs, EDRs, and countless other technologies that form the backbone of a modern enterprise’s cyber defenses. …
 
                                What Chat Control means for your privacy
The EU’s proposed Chat Control (CSAM Regulation) aims to combat child sexual abuse material by requiring digital platforms to detect, report, and remove illegal content, …
 
                                Cybersecurity jobs available right now: October 14, 2025
Cyber Security Analyst I First Citizens Bank | USA | Remote – No longer accepting applications As a Cyber Security Analyst, you will be responsible for developing skills …
 
                                Lattice MachXO5-NX TDQ prepares organizations for quantum-era security threats
Lattice Semiconductor introduced the Lattice MachXO5-NX TDQ family, a secure control FPGAs with full Commercial National Security Algorithm (CNSA) 2.0-compliant post-quantum …
Featured news
Resources
Don't miss
- Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI