
How human bias impacts cybersecurity decision making
The human brain is a fantastic machine, but we’re all subject to cognitive bias and reasoning errors – and cybersecurity pros are no exception. In a newly released …

Malware peddlers hit Office users with old but reliable exploit
Emails delivering RTF files equipped with an exploit that requires no user interaction (except for opening the booby-trapped file) are hitting European users’ inboxes, …

Is there a weak link in blockchain security?
Recent research revealed that blockchain is set to become ubiquitous by 2025, entering mainstream business and underpinning supply chains worldwide. This technology is set to …

New user keystroke impersonation attack uses AI to evade detection
A sophisticated attack, called Malboard, in which a compromised USB keyboard automatically generates and sends malicious keystrokes that mimic the attacked user’s …

Most e-commerce websites running Magento at high risk of cybercrime
New research has found 87% of SME websites using the Magento platform are currently at high risk from cyber attacks. By contrast, under 10% of websites using other major …

There’s a significant disconnect between DevOps capabilities and DevSecOps readiness
Retailers are putting their customer’s data at risk by failing to incorporate proper security controls in their new application development practices, according to the latest …

Week in review: Critical Exim flaw, weaponized cars, June Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: Apple debuts privacy-minded “Sign in with Apple” SSO Apple’s new single sign-on (SSO) …

Two-thirds of iOS apps don’t use App Transport Security
Most iOS apps don’t take advantage of App Transport Security (ATS), a networking security feature offered by Apple that ensures encrypted connections between apps and …

June Patch Tuesday forecast: Apply updates before BlueKeep hits the streets
Can you believe it is June already? Summer is rapidly approaching, but it’s been slow to warm up our temperatures here in the US. I can’t say the same thing about the …

Critical Exim flaw exploitable locally and remotely, patch ASAP!
A critical vulnerability in Exim, the mail transfer agent (MTA) deployed on over half of all Internet-facing mail servers, may allow attackers to run commands as the …

Criminals are selling hacking services targeting world’s biggest companies
A new study – undertaken by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and underwritten by Bromium – provides details of first-hand …

Global communications service providers struggling to fend off growing number of DDoS attacks
Global communications service providers, whose businesses are predicated on continuous availability and reliable service levels, are struggling to fend off a growing number of …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware