Europol goes after The Com’s ransomware and extortion networks

Law enforcement agencies across 28 countries have spent the past year building cases against a loosely organized collective known as The Com, a decentralized network of mostly teenagers and... Read more »

Microsoft brings ASUS and Dell into its Windows 365 Cloud PC strategy

Microsoft is adding two new Windows 365 Cloud PC devices, the ASUS NUC 16 for Windows 365 and the Dell Pro Desktop for Windows 365, expanding hardware options for... Read more »

Illumio Insights brings agentless visibility and breach containment to hybrid environments

Illumio unveiled its solution to deliver agentless visibility and breach containment across both data center and cloud environments. Illumio Insights ingests real-time telemetry and policy data from Check Point... Read more »

AuthMind enhances identity observability to secure vaults, secrets, and NHIs

AuthMind has announced that its platform offers enhanced capabilities to address the fast-growing security concerns surrounding vaults, secrets managers, and AI-driven workloads. Since its founding, AuthMind has focused on... Read more »

Ransomware activity peaks outside business hours

Intrusions continue to center on credential access and timed execution outside standard business hours. The Sophos Active Adversary Report 2026 analyzes 661 incident response and managed detection and response... Read more »

NATO greenlights iPhone and iPad for classified information handling

Apple confirmed that the iPhone and iPad have been approved for use with classified information in NATO restricted environments. The devices will no longer require special software or settings... Read more »

N-able’s Anomaly Detection feature identifies credential-based threats

N-able expanded its Anomaly Detection capabilities in Cove Data Protection to combat the surge in identity-driven cyberattacks targeting backup environments. The new functionality delivers real-time alerts when suspicious or... Read more »

Oculeus 2FN authenticates calls in real time to stop CLI spoofing

Oculeus has launched its new Two Factor Network (2FN) solution. The 2FN solution provides a framework for telcos to trace the origin of traffic, verify caller identity, determine the... Read more »

Varist Hybrid Detection Engine protects against AI-assisted malware

Varist launched the Hybrid Detection Engine, creating an AI-scale malware detection solution that detects both known and zero-day threats. Built on proven technology used to perform more than 500... Read more »

Android app uses Bluetooth signals to detect nearby smart glasses

Smart glasses with built-in cameras are showing up in more public spaces, and a growing number of people want a way to know when one is nearby. An Android... Read more »
Subscribe to our Newsletter