Insights
NDSS 2025 – Workshop on Binary Analysis Research (BAR) 2025, Keynote II
Authors, Creators & Presenters: Dr. Heng Yin PhD, Professor, Department of Computer Science and Engineering, University of California, Riverside Workshop on Binary Analysis Research (BAR)...
API Attack Awareness: When Authentication Fails — Exposing APIs to Risk
Authentication issues seem like low-level attacks. But authentication today – especially API authentication – can be more difficult than people expect. Companies rely on APIs...
Critical insights Q&A: AcceleTrex pilots a trust-first, privacy-led model to reinforce business outcomes
By Byron V. Acohido I’ve been writing about data trust and privacy engineering for more than a decade. Related: Preserving privacy can be profitable In...
Microsoft set to escape French antitrust probe as Qwant complaint falters
Broader implications for enterprises Analysts say European regulators are becoming more selective about which complaints proceed, with greater emphasis on the merits and the market...
AI and the Golden Age of Surveillance
In the Cold War and McCarthy era, surveillance was a matter of craft, not computation. It took people, patience and paperwork. Agents had to physically...
Designing Security for Developers, Not Around Them
Generative AI (GenAI) is improving productivity across many roles, especially for developers. There is no question about that. In fact, a 2023 study by McKinsey found that...
Trending News
Gamaredon X Turla collab
In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this blogpost: In February 2025,...
Small businesses, big targets: Protecting your business against ransomware
Business Security Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises Phil...
HybridPetya: The Petya/NotPetya copycat comes with a twist
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new...
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising...
Are cybercriminals hacking your systems – or just logging in?
Business Security As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked...
Preventing business disruption and building cyber-resilience with MDR
Business Security Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy...