OWASP Top 10 for 2025: What’s New and Why It Matters
In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright,...
In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright,...
Google is taking a multi-pronged approach to stopping a widespread global smishing operation that targeted more than a million...
The problems for Conduent Business Solutions 10 months after the solutions and services provider in January detected intruders in...
Online payment processor Checkout.com was attacked earlier this month by the high-profile extortion group ShinyHunters, which claimed it had...
A Chinese nation-state threat group abused Anthropic’s Claude AI model in a series of cyberespionage attacks that the AI...
The harsh reality for cybersecurity professionals is that the traditional cybersecurity solutions and strategies they have relied on for...
AI’s rapid advancement is stirring up both enthusiasm and concern, particularly regarding data security. While traditional security measures have...
The rapid introduction of Ai agents that can crawl the web like typical search engines is creating a security...
Former cybersecurity pros at two companies are facing federal charges for allegedly hacking into the networks of five companies...
Source: Google Chrome is getting an upgrade aimed at making online forms less painful. Google has rolled out a new...
In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts...
In the waning days of the Biden Administration in January, the Federal Communications Commission (FCC) made a declaratory ruling...
Peter Williams admits to selling unpatched iPhone bugs to a shady Russian broker.The former head of L3Harris’s Trenchant “offensive cyber”...
Threat researchers with cybersecurity firm Silent Push are linking bad actors with heavy ties to the Russian underworld to...
The rapid increase in data breaches has prompted businesses to strengthen their identity and access management (IAM) strategies through...