Governance maturity defines enterprise AI confidence

AI security has reached a point where enthusiasm alone no longer carries organizations forward. New Cloud Security Alliance research shows that governance has become the main factor separating teams... Read more »

Counterfeit defenses built on paper have blind spots

Counterfeit protection often leans on the idea that physical materials have quirks no attacker can copy. A new study challenges that comfort by showing how systems built on paper... Read more »

What happens to enterprise data when GenAI shows up everywhere

Generative AI is spreading across enterprise workflows, shaping how employees create, share, and move information between systems. Security teams are working to understand where data ends up, who can... Read more »

Top 10 cyber crime stories of 2025

In many regards, 2025 proved to be a relatively normal year for the cyber security world as threat actors and security pros continued their long-running cat-and-mouse game, but it... Read more »

Red Hat GitLab breach exposes data of 21,000 Nissan customers

Hackers breached Red Hat’s GitLab, stealing data of 21,000 customers; Nissan confirmed exposure via a self-managed GitLab instance. Japanese carmaker Nissan disclosed a data breach tied to a self-managed... Read more »

UK Government Urged to Review Palantir Contracts After Swiss Security Report

The report warned that sensitive military data shared with Palantir could potentially be accessed by US government bodies, including intelligence services. The post UK Government Urged to Review Palantir... Read more »

Critical n8n flaw could enable arbitrary code execution

A critical flaw in the n8n automation platform could allow attackers to execute arbitrary code if exploited under specific conditions. Researchers warn that a critical vulnerability, tracked as CVE-2025-68613 (CVSS... Read more »

SEC Targets Crypto Platforms in Social Media Scam Crackdown

The Securities and Exchange Commission launched an enforcement wave targeting three purported cryptocurrency trading platforms and four investment clubs. The post SEC Targets Crypto Platforms in Social Media Scam... Read more »

Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits

Malware peddlers are targeting infosec enthusiasts, budding security professionals, and aspiring hackers with the Webrat malware, masquerading the threat as proof-of-concept (PoC) exploits for known vulnerabilities. Delivering the malware... Read more »

Why Third-Party Access Remains the Weak Link in Supply Chain Security

Attackers exploited a supply chain weakness, abusing trusted components to compromise systems and spread malicious activity across connected targets. Your next breach probably won’t start inside your network—it will... Read more »
Subscribe to our Newsletter