Insights

Humanoid Robots are Walking Trojan Horses — And They’re Already in the Workplace

A new study reveals severe security flaws in the Unitree G1 humanoid robot, exposing risks from Bluetooth backdoors to hidden data exfiltration. Researchers warn that...

Survey Surfaces Extent to Which Cybersecurity Teams Are Drowning in Alerts

A new Illumio survey shows 67% of security teams face 2,000+ daily alerts, fueling fatigue and missed threats. AI/ML seen as key to reducing risk....

Closing the Gaps: Protecting Your Pipeline from Open Source Malware

Open source software is the backbone of modern development, powering everything from business applications to AI-driven systems. But with that growth has come a new...

Google Mandiant: Emails Sent to Corporate Execs Claiming Oracle Data Theft

Corporate executives at multiple organizations are receiving malicious emails from threat actors saying they are associated with the Cl0p ransomware group and have sensitive data...

Qualcomm defeats Arm’s final legal arguments in licensing trial

Sag added, “while I don’t believe we will ever know all the facts of this case, it has fundamentally changed the relationship between Qualcomm and...

CISA Ends Funding for MS-ISAC Program for State and Local Governments

CISA ended a 21-year agreement with CIS to run MS-ISAC, a cyberthreat resource and information-sharing program that local and state governments relied on, and is...

Trending News

Gamaredon X Turla collab

In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this blogpost: In February 2025,...

Small businesses, big targets: Protecting your business against ransomware

Business Security Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises Phil...

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new...

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising...

Are cybercriminals hacking your systems – or just logging in?

Business Security As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked...

Preventing business disruption and building cyber-resilience with MDR

Business Security Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy...