NordPass streamlines two-factor authentication with a built-in Authenticator across devices

NordPass simplifies secure logins by including Authenticator on multiple devices in the application for personal use. The time-based one-time password (TOTP) support enables users to add an extra layer... Read more »

European Commission opens consultation on EU digital ecosystems

The European Commission has opened a public call for evidence on European open digital ecosystems, a step toward a planned Communication that will examine the role of open source... Read more »

Iran cuts Internet nationwide amid deadly protest crackdown

Iran shut down the internet as protests spread nationwide. Dozens were killed in a violent crackdown amid soaring inflation and a collapsing currency. Iran has shut down the internet... Read more »

Data Security Firm Cyera Raises $400M, Hits $9B Valuation

This represents a 50% jump from its $6 billion valuation achieved seven months ago, signaling investor confidence in AI security solutions. The post Data Security Firm Cyera Raises $400M,... Read more »

China-linked UAT-7290 spies on telco in South Asia and Europe using modular malware

China-linked UAT-7290 has targeted South Asia and Southeastern Europe since 2022, conducting espionage and deploying RushDrop, DriveSwitch, and SilentRaid. China-linked threat actor UAT-7290 has conducted espionage attacks since at... Read more »

From promise to proof: making AI security adoption tangible

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth... Read more »

January 2026 Patch Tuesday forecast: And so it continues

Welcome to a new year of my Patch Tuesday forecast blog where I provide a summary of Microsoft and other vendor’s security patch activity (and reported issues) for the... Read more »

How AI agents are turning security inside-out

AppSec teams have spent the last decade hardening externally facing applications, API security, software supply chain risk, CI/CD controls, and cloud-native attack paths. But a growing class of security... Read more »

Computer Misuse Act reform is overdue – not all anniversaries should be celebrated

Let’s not have any further anniversaries for the UK’s outdated cyber security laws – the government has dragged its heels for too long and reform is urgently needed Read more »

Product showcase: TrackerControl lets Android users see who’s tracking them

TrackerControl is an open-source Android application designed to give users visibility into and control over the hidden data within mobile apps. Many apps routinely communicate with third-party services that... Read more »
Subscribe to our Newsletter