The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

You can’t control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have... Read more »

WhatsApp is giving parents peace of mind over their kids’ privacy

WhatsApp has introduced parent-managed accounts designed for pre-teens, giving parents and guardians new controls over contacts, group participation, and how the app is used. These accounts are limited to... Read more »

Socure Launch enables startups to deploy identity verification and fraud controls

Socure has announced Socure Launch, providing every organization with immediate access to industry tested, pre-built identity and fraud solutions. This marks a new era for Socure, providing startups an... Read more »

Zscaler enhances data sovereignty controls with regional processing and logging

Zscaler has expanded its data sovereignty capabilities globally, powered by the Zscaler Zero Trust Exchange cloud security platform. For global enterprises, the conflict between protecting data and enabling cross-border... Read more »

SOC Prime’s DetectFlow Enterprise moves threat detection to the data ingestion layer

SOC Prime has announced the release of DetectFlow Enterprise, a solution that brings real-time threat detection to the ingestion layer, turning data pipelines into detection pipelines. Running tens of... Read more »

Binary Defense’s NightBeacon brings AI-driven analysis to SOCs

Binary Defense has announced the launch of NightBeacon, an AI-powered security operations platform built directly into the company’s security operations center (SOC). NightBeacon serves as the intelligence infrastructure behind... Read more »

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the... Read more »

War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker

An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S. medical device giant Stryker, marking a potential escalation of cyber activity tied to the ongoing conflict in... Read more »

U.S. CISA adds a flaw in n8n to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in n8n to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an n8n flaw,... Read more »

ENISA Technical Advisory on Secure Package Managers: Essential DevSecOps Guidance

ENISA’s first Technical Advisory on Secure Package Managers helps developers safely use third-party packages. ENISA has released its first Technical Advisory on Package Managers, focusing on how developers can... Read more »
Subscribe to our Newsletter