Insights

Your Security Team Is About to Get an AI Co-Pilot — Whether You’re Ready or Not: Report

The days of human analysts manually sorting through endless security alerts are numbered. By 2028, artificial intelligence (AI) agents will handle 80% of that...

Saturday Security: Three Breaches, Three Lessons and How Attackers Keep Adapting

This week, three very different data breaches proved one thing: no sector is safe. From nation-state espionage to data theft to social engineering, the...

Radware: Bad Actors Spoofing AI Agents to Bypass Malicious Bot Defenses

The rapid introduction of Ai agents that can crawl the web like typical search engines is creating a security gap that is allowing threat...

NDSS 2025 – Qualitative Study On Boards’ Cybersecurity Risk Decision Making

SESSIONSession 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr University Bochum), M. Angela Sasse...

How MSSPs Turn Security Alerts Into Exponential Revenue With Morpheus AI

The MSSP market is growing, but the number of players is shrinking. Industry analysis forecasts the top 200 MSSPs consolidating down to about 120...

LLM08: Vector & Embedding Weaknesses – FireTail Blog

Nov 07, 2025 – – In 2025, with the rise of AI, we’ve seen a parallel rise in cyber risks. The OWASP Top 10...

Trending News

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025  • ...

The who, where, and how of APT attacks in Q2 2025–Q3 2025

ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report 07 Nov 2025...

ESET APT Activity Report Q2 2025–Q3 2025

ESET ResearchThreat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 Jean-Ian...

Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data Christian Ali Bravo 05 Nov 2025  •  ,...

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can...

Ground zero: 5 things to do after discovering a cyberattack

Business Security When every minute counts, preparation and precision can mean the difference between disruption and disaster Phil Muncaster 03 Nov 2025  •  , 5...