Please turn on your JavaScript for this page to function normally.
vulnerability
Investing in security? It’s not helping you fix what matters faster

Automation and structured collaboration have a strong, positive influence on the efficiency of vulnerability management, according to Seemplicity. However, manual processes, …

Vulnerability
Most critical vulnerabilities aren’t worth your attention

Web applications face a wide range of risks, including known-exploitable vulnerabilities, supply chain attacks, and insecure identity configurations in CI/CD, according to the …

mobile device
Flexible working models fuel surge in device theft

76% of respondents have been impacted by incidents of device theft in the past two years, with incidents more common in organizations with more flexible working models, …

Edgescan 2025 Vulnerability Statistics Report
Exposed and unaware: The state of enterprise security in 2025

The Edgescan 2025 Vulnerability Statistics Report offers a data-rich snapshot of the global cybersecurity landscape, drawing from thousands of assessments and penetration …

energy
A new era of cyber threats is approaching for the energy sector

Cyber threats targeting the energy sector come in many forms, including state-sponsored actors seeking to disrupt national infrastructure, cybercriminals motivated by profit, …

AI
One in three security teams trust AI to act autonomously

While AI adoption is widespread, its impact on productivity, trust, and team structure varies sharply by role and region, according to Exabeam. The findings confirm a critical …

cybercrime
2025 Data Breach Investigations Report: Third-party breaches double

The exploitation of vulnerabilities has seen another year of growth as an initial access vector for breaches, reaching 20%, according to Verizon’s 2025 Data Breach …

cybercrime
Phishing emails delivering infostealers surge 84%

Cybercriminals continued to shift to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to IBM. …

stress
54% of tech hiring managers expect layoffs in 2025

54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and 45% say employees whose roles can be replaced by AI are most likely to …

risk
The C-suite gap that’s putting your company at risk

New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on how exposed their companies are or where the …

compliance
Compliance weighs heavily on security and GRC teams

Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report reveals that fragmented …

hand
Cybercriminals blend AI and social engineering to bypass detection

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools