Insights

Lion Safe-Zone

Hat Tip to Verification Labs :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE...

NDSS 2025 – MALintent: Coverage Guided Intent Fuzzing Framework For Android

SESSIONSession 2D: Android Security 1 Authors, Creators & Presenters: Ammar Askar (Georgia Institute of Technology), Fabian Fleischer (Georgia Institute of Technology), Christopher Kruegel (University...

Commvault Extends AI Ability to Ensure Cyber Resilience

Commvault today extended the reach and scope of its data protection portfolio as part of an effort to enable IT organizations to achieve and...

Queen City Con 0x3: Hacking And Embracing Resiliency

Cincinnati holds the distinction of being the first in the United States to establish a municipal fire department in 1853, as well as the...

How to Build a Strong Ransomware Defense Strategy for Your Organization?

Ransomware attacks increased by 149% in 2025, within the U.S. alone. Organizations have paid millions in ransom and recovery costs, making ransomware attacks one...

Intel Sues Ex-Employee It Claims Stole 18,000 Company Files

IT giant Intel is reportedly suing a former employee who allegedly downloaded about 18,000 files days before leaving the company.Intel, on the last day...

Trending News

Why shadow AI could be your biggest security blind spot

Business Security From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company Phil Muncaster 11 Nov...

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025  • ...

The who, where, and how of APT attacks in Q2 2025–Q3 2025

ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report 07 Nov 2025...

ESET APT Activity Report Q2 2025–Q3 2025

ESET ResearchThreat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 Jean-Ian...

Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data Christian Ali Bravo 05 Nov 2025  •  ,...

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can...