Please turn on your JavaScript for this page to function normally.
military business
Why ex-military professionals are a good fit for cybersecurity

After years of working as part of a team, many military veterans look for work that still carries meaning, challenge, and purpose. Cybersecurity offers a new way to serve and …

Nodepass
Nodepass: Open-source TCP/UDP tunneling solution

When you think of network tunneling, “lightweight” and “enterprise-grade” rarely appear in the same sentence. NodePass, an open-source project, wants to change that. It’s a …

Microsoft 365
Inside the messy reality of Microsoft 365 management

Most MSPs agree that Microsoft 365 is now the backbone of business operations, but a Syncro survey shows that complexity, incomplete backups, and reactive security continue to …

A new approach to blockchain spam: Local reputation over global rules

Spam has long been a nuisance in blockchain networks, clogging transaction queues and driving up fees. A new research paper from Delft University of Technology introduces a …

healthcare cybersecurity
Inside healthcare’s quiet cybersecurity breakdown

Hospitals, clinics, and care networks continue to treat cybersecurity as a back-office issue, according to the 2025 Healthcare IT Landscape Report from Omega Systems. Security …

AI
Everyone’s adopting AI, few are managing the risk

AI is spreading across enterprise risk functions, but confidence in those systems remains uneven, according to AuditBoard. More than half of organizations report implementing …

danger
When trusted AI connections turn hostile

Researchers have revealed a new security blind spot in how LLM applications connect to external systems. Their study shows that malicious Model Context Protocol (MCP) servers …

insider threat
Identifying risky candidates: Practical steps for security leaders

Effective insider threat defense begins with candidate vetting. Background checks and reference calls can confirm elements of an applicant’s history, but they rarely surface …

artificial intelligence
Everyone wants AI, but few are ready to defend it

The rush to deploy AI is reshaping how companies think about risk, according to Cisco. A global study finds that while most organizations are moving quickly to adopt AI, many …

humanoid robot
Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot that …

biometrics
The password problem we keep pretending to fix

Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. …

ics cybersecurity
A safer way to break industrial systems (on purpose)

Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin University has developed a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools