
How fraud prevention tech can save banks €10M a year
A typical European bank, serving 10 million customers, could save up to €10 million annually and avoid growing fines by the regulator by implementing technology to improve the …

Free offering enables any MSP and security integrator to add incident response to their services portfolio
The Incident Response (IR) services market is in accelerated growth due to the rise in cyberattacks that result in breaches. More and more organizations, across all sizes and …

BMC vulnerabilities in Supermicro servers allow remote takeover, data exfiltration attacks
A slew of vulnerabilities affecting the baseboard management controllers (BMCs) of Supermicro servers could be exploited by remote attackers to gain access to corporate …

Attackers are exploiting vulnerable WP plugins to backdoor sites
A group of attackers that has been injecting WordPress-based sites with a script redirecting visitors to malicious and fraudulent pages has now also started backdooring the …

How to reduce the attack surface associated with medical devices
As the number of connected medical devices continues to rise, so does healthcare organizations’ attack surface. “Most medical devices available in the healthcare system today …

Cardholders still dropping the ball when it comes to basic ID theft prevention
Four in 10 people with a credit or debit card have provided their full Social Security number in an online form in the past month, according to a new report from CompareCards, …

Researchers develop cheaper, more efficient Internet connectivity for IoT devices
A cheaper and more efficient method for IoT devices to receive high-speed wireless connectivity has been developed by researchers at the University of Waterloo. With 75 …

Quantum computing market revenue to reach $9.1 billion annually by 2030
Quantum computing can best be defined as the use of the attributes and principles of quantum mechanics to perform calculations and solve problems. The global market for …

Whitepaper: Security Orchestration with Threat Intelligence
Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. This …

Week in review: Mass iPhone hacking, SSL VPNs under attack, SOC analysts overwhelmed
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Cybersecurity in the age of the remote workforce Users can be set up for a …

Google discovers websites exploiting iPhones, pushing spying implants en masse
Unidentified attackers have been compromising websites for nearly three years, equipping them with exploits that would hack visiting iPhones without any user interaction and …

Google will pay for data abuse reports related to popular Android apps, Chrome extensions
Google is expanding the Google Play Security Reward Program (GPSRP) to include all apps in Google Play with 100 million or more installs, and is launching a new Developer Data …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations