NSA Publishes New Zero Trust Implementation Guidelines

NSA released new guidelines to help organizations achieve target-level Zero Trust maturity - Read more

Hugging Face Repositories Abused in New Android Malware Campaign

Attackers exploited Hugging Face’s trusted infrastructure to spread an Android RAT, using fake security apps and thousands of malware variants. The post Hugging Face Repositories...

Human Risk Management: Das Paradoxon der Sicherheitsschulungen

Security Awareness Trainings sollten auf dem Human-Risk-Management-Ansatz basieren. FAMILY STOCK – shutterstock.com Unternehmen investieren Millionen von Dollar in Firewalls,...

2nd February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES MicroWorld Technologies, maker...

Why should renters like me have to trade away our privacy just to get...

The rise in real estate tech means renters often hand over huge amounts of revealing information to digital third parties – at great riskGet...

Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks

A critical advisory addressing a severe SQL injection vulnerability affecting multiple Johnson Controls industrial control system products. The vulnerability, tracked as CVE-2025-26385, carries a...

Real estate agents in Australia using apps that leave millions of lease documents at...

Exclusive: ‘This is a blatant and disturbing disregard for the law and for people’s security,’ digital rights advocate saysFollow our Australia news live blog...

Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team |...

Key Takeaways: Recorded Future deployed Autonomous Threat Operations within its own SOC before customer release, ensuring real-world effectiveness and identifying critical capabilities....

Essential E-Signature Solutions for Cybersecurity in 2026

E-signatures are now part of your security posture. In 2026, most organizations sign contracts, approvals, onboarding packets, and financial documents electronically. That increases...

Latest article

Hackers Use Fake CleanMyMac Site to Deploy SHub Stealer and Hijack Crypto Wallets

A convincing fake website posing as the popular Mac utility CleanMyMac is actively pushing dangerous macOS malware called SHub Stealer onto unsuspecting users. ...

CVE program funding secured, easing fears of repeat crisis

The Cybersecurity and Infrastructure Security Agency and the MITRE Corporation have renegotiated the contract supporting the 26-year-old Common Vulnerabilities and...

Outbreak Alert- Annual Report 2025

In 2025, the FortiGuard Labs team processed and blocked 3.8 trillion vulnerability exploitation attempts, preventing 2.71 billion malware deliveries, and blocking 257 million newly...

9th March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 9th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES AkzoNobel, a Netherlands-based...