Overreliance on GenAI to develop software compromises security

GenAI is quickly changing the software development process by automating tasks that once took developers hours, if not days, to complete, bolstering efficiency and productivity, according to Legit Security.... Read more »

Russian Phobos ransomware operator faces cybercrime charges

Russian Phobos ransomware operator Evgenii Ptitsyn, accused of managing attacks, was extradited from South Korea to the US to face cybercrime charges. Russian Phobos ransomware operator Evgenii Ptitsyn, suspected... Read more »

Vishing, Wangiri, and Other VoIP Fraud Tactics On the Rise

Protect your business from VoIP fraud. Learn how to recognize the most common types and harden your phone system security. Read more »

Dell Unveils AI and Cybersecurity Solutions at Microsoft Ignite 2024

Dell announced new AI and cybersecurity advancements at Microsoft Ignite, including APEX File Storage and Copilot services for Azure. Read more »

Microsoft announces Zero Day Quest hacking event with big rewards

Microsoft is enhancing its bug bounty initiatives with the launch of the Zero Day Quest hacking event. With $4 million in potential rewards, it focuses on driving research in... Read more »

Microsoft announces new and improved Windows 11 security features

Microsoft has implemented some and is working on delivering several other security-related features and improvements for Windows 11. Administrator protection will allow users to make system changes on their... Read more »

Microsoft plans to boot security vendors out of the Windows kernel

Microsoft has announced the Windows Resiliency Initiative, aimed at avoiding a repeat of the prolonged worldwide IT outage caused by a buggy CrowdStrike update that took down millions of... Read more »

Windows 365 Link: Connect securely to Windows 365

Microsoft unveiled Windows 365 Link, their first purpose-built Cloud PC device for instant, secure connection to Windows 365. Sign-in screen with USB security key option (Source: Microsoft) Windows 365... Read more »

Cross-IdP impersonation bypasses SSO protections

Cross-IdP impersonation – a technique that enables attackers to hijack the single sign-on (SSO) process to gain unauthorized access to downstream software-as-a-service (SaaS) applications without compromising a company’s primary... Read more »

The 6 Best Free Antivirus Software Providers for Mac in 2024

Security-conscious Mac users may need more protection than their built-in tools provide. Learn about the extra features and functionality offered by the best free antivirus software providers for Mac... Read more »
Subscribe to our Newsletter