EU Chat Control plans pose ‘existential catastrophic risk’ to encryption, says Signal

As EU member states prepare to vote on plans to mandate tech companies to introduce technology to scan messages before they are encrypted, Signal warns that Chat Control will... Read more »

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts

Despite Cisco and various cybersecurity agencies warning about attackers actively exploting zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) for months, there are still around 48,000... Read more »

Siemens simplifies OT security with virtualized, encrypted connectivity

Siemens launched SINEC Secure Connect, the zero trust security platform designed for operational technology (OT) networks. The software solution virtualizes network structures using overlay networks. It enables Machine-to-Machine, Machine-to-Cloud,... Read more »

New 360 Strata platform delivers actionable intelligence to protect sensitive data

360 Privacy launched 360 Strata, an advanced privacy platform designed to transform how organizations understand, manage, and reduce digital exposures. The platform empowers executives, security teams, and family offices... Read more »

Akuity unveils AI-powered incident detection and automation for Kubernetes

Akuity has launched new AI capabilities that enable users to detect degraded states across applications, triage incidents, and automate fixes on the Akuity platform within minutes. The platform also... Read more »

WestJet confirms cyberattack exposed IDs, passports in June incident

WestJet confirms June cyberattack that disrupted certain internal systems, exposed customer passports and IDs. WestJet airline confirmed the June security breach exposed customer passports and IDs. WestJet is a... Read more »

Hackers love LOTL, this approach shuts them down

Every time cyber defenders and companies discover new ways to block intrusions, attackers change their tactics and find a way around the defenses. “Living off the Land” (LOTL) is... Read more »

A2AS framework targets prompt injection and agentic AI security risks

AI systems are now deeply embedded in business operations, and this introduces new security risks that traditional controls are not built to handle. The newly released A2AS framework is... Read more »

Cato extends zero trust access to SASE platform

Capability launched for secure access service edge platform extends zero trust network access to unmanaged devices including personal, contractor and BYOD endpoints Read more »

Biometric spoofing isn’t as complex as it sounds

Biometric technologies were originally designed to improve security and streamline authentication, but they’re often misused in ways most people don’t notice. Like any system, biometrics has weaknesses that attackers... Read more »
Subscribe to our Newsletter