Hackney Council reprimanded over 2020 ransomware attack

Read more »

Avast SecureLine VPN vs NordVPN (2024): Which VPN Is Better?

Which VPN is better, Avast SecureLine VPN or NordVPN? Use our guide to compare pricing, features, and more. Read more »

Appgate launches Malware Analysis Service to safeguard enterprises and government agencies

Appgate has unveiled its new Malware Analysis Service that mitigates cyberthreats for enterprises and government agencies by identifying and neutralizing malicious software. Appgateā€™s Malware Analysis and Research Team now... Read more »

Labour government plans new laws around cyber security, data sharing and skills

Read more »

Invicti API Security uncovers hidden and undocumented APIs

Invicti announced Invicti API Security, merging comprehensive API discovery with proactive security testing into a single solution. The growth of service-based architectures has driven an explosion in APIs, creating... Read more »

OpenText Cloud Editions 24.3 elevates human potential

OpenText announced its latest product innovations with Cloud Editions (CE) 24.3. This release represents a significant leap forward in integrating advanced information management capabilities, trusted cloud solutions, robust security... Read more »

Red Hat OpenShift enhancements help organizations connect their disparate, diverse workloads

Red Hat introduced new capabilities and enhancements for Red Hat OpenShift, a hybrid cloud application platform powered by Kubernetes, as well as the general availability of Red Hat Advanced... Read more »

The Octo Tempest group adds RansomHub and Qilin ransomware to its arsenal

Microsoft said that in Q2 2024, the Octo Tempest cybercrime gang added RansomHub and Qilin ransomware to its arsenal. In the second quarter of 2024, financially motivated threat actor... Read more »

Overlooked essentials: API security best practices

In this Help Net Security, Ankita Gupta, CEO at Akto, discusses API security best practices, advocating for authentication protocols like OAuth 2.0 and OpenID Connect, strict HTTPS encryption, and... Read more »

SubSnipe: Open-source tool for finding subdomains vulnerable to takeover

SubSnipe is an open-source, multi-threaded tool to help find subdomains vulnerable to takeover. It’s simpler, produces better output, and has more fingerprints than other subdomain takeover tools. “SubSnipe does... Read more »
Subscribe to our Newsletter