News

COO & CPO of Nucleus, operating as a hands-on technical executive, building and managing the security software aimed at optimizing the vulnerability management process. Prior to founding Nucleus, ...
The prolific Scattered Spider threat group, which recently targeted U.S. and UK retailers in a series of attacks, is now ...
Even when infrastructure improves, enterprises still face a fundamental hurdle: AI systems don’t behave like traditional software.
Anyone accepting or sending ACH payments should understand common fraud techniques and take appropriate measures to curb them.
Cato CTRL has discovered previously unreported WormGPT variants, but with a twist — they are powered by xAI’s Grok and Mistral AI’s Mixtral.
In this episode, we explore the Kids Online Safety Act (KOSA), a controversial bill aimed at protecting children online. Joined by co-host Scott Wright, we discuss the potential implications of KOSA, ...
During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers leveraging cognitive vulnerabilities to cause major impacts to nation ...
Are You Ready for the Future of Cybersecurity? Cybersecurity is not just about human identities anymore. A rising segment of digital focuses on non-human identities (NHIs) – a crucial feature in any ...
Cybernews researchers reported that since the beginning of the year, they've detected 30 datasets containing 16 billion ...
Amazon Web Services (AWS) this week revealed it has added new categories for describing offerings provided by partners offering managed services security providers (MSSP) as part of an effort to ...
Continuous penetration testing is a modern security approach that performs real-time or near-real-time simulations of ...
Tonic Validate is a free, open-source library for evaluating RAG and LLM based applications. We recently announced a new ...