Amazon MemoryDB for Redis: Fast performance with sub-millisecond latency and high durability
Amazon Web Services announced the general availability of Amazon MemoryDB for Redis, a fully managed, Redis-compatible, in-memory database. Amazon MemoryDB for Redis enables …
Keysight Nemo 5G RAN Analytics software automates data processing, reporting and analytics
Keysight Technologies has launched the new Keysight Nemo 5G RAN Analytics software, a fully automated cloud-based solution for streamlining data processing, as well as …
Mitch Lowe invests in UseCrypt to offer privacy in the field of telecommunications
Mitch Lowe – co-founder senior executive of Netflix, long time president of Redbox and Moviepass, has joined UseCrypt. The official announcement took place in Monaco, …
Financial services accounting for nearly 40% of all phishing URLs
Vade released its Phishers’ Favorites report for H1 2021, which revealed that there has been a major jump in phishing attacks since the start of the year with a 281 percent …
Code42 enhances Incydr to help identify insider risk related to file uploads to unsanctioned websites
Code42 is introducing enhanced capabilities to the Code42 Incydr data risk detection and response product for identifying insider risk related to file uploads to unsanctioned …
End-to-end encrypted communication mitigates enterprise security risk and ensures compliance
It is a mathematical certainty that data is more protected by communication products that provide end-to-end encryption (E2EE). Yet, many CISOs are required to prioritize …
Mobile messengers expose billions of users to privacy attacks
Popular mobile messengers expose personal data via discovery services that allow users to find contacts based on phone numbers from their address book, according to …
Cybercriminals are using IM platforms as marketplaces
Cybercriminals are increasingly using IM platforms like Telegram, Discord, Jabber, WhatsApp, IRC and others to advertise and sell their goods and services, IntSight …
The 25 most impersonated brands in phishing attacks
PayPal remains the top brand impersonated in phishing attacks for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third, according to …
WhatsApp RCE flaw can be exploited by sending malicious MP4 files
Facebook has patched a critical vulnerability (CVE-2019-11931) affecting various versions of its popular WhatsApp Messenger app and is urging users to update as soon as …
2FA, HTTPS and private browsing still a mystery to most Americans
Most US adults know what phishing scams are and where they occur, what browser cookies do, and that advertising is the largest source of revenue for most social media …
Google discovers websites exploiting iPhones, pushing spying implants en masse
Unidentified attackers have been compromising websites for nearly three years, equipping them with exploits that would hack visiting iPhones without any user interaction and …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month