Insights
SOC 2 penetration testing requirements
March 23, 2026 Adam King Director For organisations pursuing SOC 2, demonstrating effective security controls is central to the audit process. While the framework...
FriendlyDealer mimics official app stores to push unvetted gambling apps
We’ve identified a huge social-engineering campaign designed to steer people into online gambling sites under the impression they’re installing a legitimate app. We’re calling...
SecurityScorecard Debuts TITAN AI to Automate Third-Party Risk Management Workflows
RSAC 2026: SecurityScorecard is using RSA Conference week to roll out TITAN AI, a set of capabilities aimed at taking manual work out of...
Trivy Scanner Compromise Explained and What it Means For Your SaaS and CI/CD Security
AppOmni Labs explains how this SaaS supply chain attack occurred and how to guard your entire SaaS ecosystem against these compromises. Analyzing the Aqua...
AI Readiness Assessment: How to Evaluate If Your Business Is Truly Ready for AI
AI is no longer optional. It is already reshaping cost structures, decision making, and competitive positioning. The question is not whether you should adopt...
Chrome encryption bypass discovered: New malware steals passwords and cookies
Vojtěch Krejsa, the threat researcher at Gen who first flagged the stealer, calls VoidStealer’s bypass non-noisy. “The bypass requires neither privilege escalation nor code injection,...
Trending News
Move fast and save things: A quick guide to recovering a hacked account
Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....
EDR killers explained: Beyond the drivers
In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...
Face value: What it takes to fool facial recognition
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...
Cyber fallout from the Iran war: What to have on your radar
The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...
Sednit reloaded: Back in the trenches
Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...
What cybersecurity actually does for your business
Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...
