Insights

NDSS 2025 – Keynote 2: Towards Resilient Systems In An Increasingly Hostile World

Author, Creator & Presenter: Dr. Kathleen Fisher PhD, Director, Information Innovation Office (I2O), US Defense Advanced Research Projects Agency (DARPA) Our thanks to the Network...

Revisiting CISA Priorities for FY2026 and Beyond

Lohrmann on Cybersecurity The Cybersecurity and Infrastructure Security Agency is under new leadership and focus as we enter FY2026. So what are the priorities for...

Is Your Spend on Cloud Security Justified?

How Secure Are Your Non-Human Identities? Have you ever considered how secure your non-human identities are? Safeguarding Non-Human Identities (NHI) is paramount, particularly where organizations...

NDSS 2025 – Keynote 1: Quantum Security Unleashed: A New Era for Secure Communications and Systems

Author, Creator & Presenter: Dr. Johanna Sepúlveda PhD, Senior Expert and Technical Domain Manager for Quantum and Quantum-Secure Technologies, Airbus Defence and Space Our thanks...

Is a CIAM Certification Beneficial?

Understanding CIAM and Its Growing Importance Okay, let's dive into CIAM, or Customer Identity and Access Management. Ever wonder how companies really know it's you...

News alert: SquareX exposes how AI browsers fall prey to OAuth hijacks and malware traps

PALO ALTO, Calif., Oct. 9, 2025, CyberNewswire — As AI Browsers rapidly gain adoption across enterprises, SquareX has released critical security research exposing major vulnerabilities...

Trending News

Gamaredon X Turla collab

In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this blogpost: In February 2025,...

Small businesses, big targets: Protecting your business against ransomware

Business Security Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises Phil...

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET researchers have uncovered a new...

Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware, adding the capability of compromising...

Are cybercriminals hacking your systems – or just logging in?

Business Security As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked...

Preventing business disruption and building cyber-resilience with MDR

Business Security Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy...