News

Early signs of heightened threat activity have already emerged across utilities such as oil and gas, electricity grids, and ...
During Red Teaming simulations, an independent ‘Red Team’ assumes the role of real attackers, probing systems, processes, and ...
You can't protect what you can't see. From shadow IT to supplier risk, modern attack surfaces are sprawling fast — and ...
Marlink has launched the External Attack Surface Management ... across a company’s internet-facing systems. Key features of the EASM solution include real-time asset discovery, which allows users to ...
Internet-related scams continue to increase, with those aged 60 and older being the most susceptible to an assortment of schemes.
Tech expert Kurt “CyberGuy" Knutsson reports that Tesla owners are facing threats as hackers weaponize leaked data. Are you ...
Marks and Spencer says teams are working "day and night" to restore the store to normal operation, after the retailer faced a ...
Most governments struggle with replacing legacy systems for a variety of reasons. But some people claim legacy mainframes can ...
This lesson could help the industry,’ Cybersmart cofounder and CTO Laurie Fialkov told Daily Maverick in a candid interview as the national outage dust settles.
AI Is Reshaping Cyber Threats: Adversaries are weaponizing AI across the entire attack lifecycle—from reconnaissance and phishing to exploitation and DDoS—making attacks faster, more targeted, and ...
Schools have become prime targets for computer hackers. Between July 2023 and December 2024, 82% of K-12 schools experienced ...
In an interview with The Register, FBI Deputy Assistant Director Cynthia Kaiser explained how Chinese state-backed cyber groups use artificial intelligence at every stage of their attack operations.