Insights

5 SOC Problems Morpheus Solves (That Legacy Tools Can’t)

You bought tools to solve problems. Now the tools are the problem. Morpheus is an autonomous SOC solution that sits on top of your existing...

NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 2025, Panel

Panelists: Ashok Prjapathi (NASA), Martin Strohmeier (Armasuisse), Stephen Schwab (USC ISI), Dan Wallach (DARPA): Our thanks to the Network and Distributed System Security (NDSS) Symposium...

Randall Munroe’s XKCD ‘’100% All Achievements”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from Infosecurity.US...

Randall Munroe’s XKCD ‘’Hiking”

via the just-in-time jocularity & water-slide wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from Infosecurity.US...

TDL 007 | Cyber Warriors & Digital Shadows: Insights from Canada’s Cybersecurity Leader

In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a...

OAuth for MCP – Emerging Enterprise Patterns for Agent Authorization

By Thomas Segura TL;DR: OAuth 2.1 is a solid foundation for MCP, but the non-deterministic nature of agent interactions introduce sequence-level risks that classic request-level...

Trending News

Gamaredon X Turla collab

In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this blogpost: In February 2025,...

Small businesses, big targets: Protecting your business against ransomware

Business Security Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises Phil...

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new...

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising...

Are cybercriminals hacking your systems – or just logging in?

Business Security As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked...

Preventing business disruption and building cyber-resilience with MDR

Business Security Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy...