News

We’re excited to partner with Datadog to provide our customers with unparalleled visibility into web risks and exposures,” ...
Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case.
Joining Graham Peck will be Isaac Moddel, VP Sales at Reflectiz, an expert in client-side security. Moddel will offer ...
The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL ...
Delaware, USA, April 2nd, 2025, CyberNewsWire Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has been recognized as one of the ...
From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates that corporations spend nearly $1 billion dollars on ransom ...
A flaw in Subaru's STARLINK connected vehicle service exposed location and driver data for millions of vehicles, a new report finds.
Keyless lock maker Digilock withdrew a cease and desist order and allowed a DEF CON talk on security flaws in its devices to move forward. Other device makers should take note!
A newly discovered campaign pushing malicious open source software packages is designed to steal mnemonic phrases used to recover lost or destroyed crypto wallets, according to a report by ...
Data stolen? Get used to it kid. That's the reality for young people coming of age today in the app sec shanty town that is the 21st century U.S. economy.
How do we improve software quality and end the epidemic of shoddy, exploitable software harming consumers, communities and businesses? To start, we need to change the way we think and talk about ...
A bunch of surveys of IT pros are clear: hreats and risks from vulnerable software supply chains are real, and they’re starting to freak people out.