We need to build psychological readiness into cyber security

The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging... Read more »

Alleged Russia-linked Curly COMrades exploit Windows Hyper-V to evade EDRs

Curly COMrades threat actors exploit Windows Hyper-V to hide Linux VMs, evade EDR tools, and deploy custom malware undetected. Bitdefender researchers, aided by Georgia’s CERT, uncovered that Curly COMrades,... Read more »

Russia-linked hackers intensify attacks as global APT activity shifts

State-aligned hacking groups have spent the past six months ramping up espionage, sabotage, and cybercrime campaigns across multiple regions, according to ESET’s APT Activity Report covering April through September... Read more »

1touch.io Kontxtual provides LLM-driven control over sensitive data

1touch.io unveils Kontxtual, an AI-driven data platform engineered for the AI era. Built to accelerate enterprise innovation without compromising control, Kontxtual harnesses the power of AI and LLMs to... Read more »

Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows

Aptori announced Code-Q (Code Quick Fix), a new agent in its AI-powered security platform that automatically generates, validates and applies code-level remediations for confirmed vulnerabilities. Building on Aptori’s AI... Read more »

MajorKey IDProof+ combats AI-driven fraud

MajorKey Technologies announced IDProof+, a high-assurance identity verification solution leveraging biometric technology. Developed in collaboration with identity verification innovator authID, IDProof+ is designed to help enterprises combat AI-driven fraud... Read more »

Hypori Secure Workspace Ecosystem helps IT teams protect enterprise data

Hypori announced the expansion of its platform with the launch of the Hypori Secure Workspace Ecosystem, a suite of next-generation products designed to give organizations flexibility, scalability, and control... Read more »

Binarly Transparency Platform 3.5 now supports Java archives and JVM bytecode

Binarly released the Binarly Transparency Platform 3.5 with Java ecosystem support, enterprise-grade YARA integration, and operational upgrades. With this update, Binarly’s cryptographic algorithm identification engine now supports Java archives... Read more »

Bitdefender GravityZone Security Data Lake unifies telemetry from multiple tools

Bitdefender announced Bitdefender GravityZone Security Data Lake and Data Lake for Managed Detection and Response (MDR), solutions that help organizations cut through alert overload and complexity by unifying security... Read more »

OpenGuardrails: A new open-source model aims to make AI safer for real-world use

When you ask a large language model to summarize a policy or write code, you probably assume it will behave safely. But what happens when someone tries to trick... Read more »
Subscribe to our Newsletter