US politicians ponder Wimwig cyber intel sharing law

US cyber data sharing legislation is set to replace an Obama-era law, but time is running out to get it over the line, with global ramifications for the security... Read more »

SVG files used in hidden malware campaign impersonating Colombian authorities

VirusTotal uncovered an undetected malware campaign using SVG files that impersonated the Colombian justice system. VirusTotal researchers uncovered a phishing campaign using SVG files with hidden JavaScript to deploy... Read more »

Jaguar Land Rover cyber attack keeps workers at home

The recent cyber attack on Jaguar Land Rover is keeping workers out of the plants as possible attack group identity becomes public Read more »

DigitalOcean adds Single Sign-On to help businesses centralize user access

DigitalOcean has announced support for Single Sign-On. This integration is designed to provide digital native businesses with secure authentication to their DigitalOcean accounts. DigitalOcean Single Sign-On (SSO) helps to... Read more »

Hirsch Velocity 3.9 turns security into business value

Hirsch released Velocity 3.9, the latest advancement in its security management platform. Purpose-built for organizations that demand trust, compliance, and operational efficiency, Velocity 3.9 helps leaders safeguard people, assets,... Read more »

SLA promises, security realities: Navigating the shared responsibility gap

The Computer Weekly Security Think Tank considers how security leaders can help assure access to the new and innovative cloud tech while minimising risk and ensuring they do not... Read more »

France’s CNIL fined Google $379M and Shein $175M for breaching cookie rules

France’s data watchdog fined Google $379M (€325 million) and Shein $175M (€150 million) for breaching cookie rules. The French data watchdog, the National Commission on Informatics and Liberty (CNIL),... Read more »

September 2025 Patch Tuesday forecast: The CVE matrix

We work in an industry driven by Common Vulnerabilities and Exposures (CVE). Each security update released by myriad vendors addresses some flaw in software that could be exploited and... Read more »

Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control

Cybersecurity researchers have disclosed a stealthy new backdoor called MystRodX that comes with a variety of features to capture sensitive data from compromised systems. “MystRodX is a typical backdoor... Read more »

How to reclaim control over your online shopping data

Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to think about what happens to the data we leave... Read more »
Subscribe to our Newsletter