NETGEAR launches Nighthawk RS700 WiFi 7 router

With the rise of faster multi-gig internet speeds now available to more and more households, the growing number of connected devices per family and the ever-increasing growth of bandwidth... Read more »

ReversingLabs adds secrets detection capabilities to SSCS platform

ReversingLabs has unveiled new secrets detection features within its Software Supply Chain Security (SSCS) platform. ReversingLabs improves secrets detection coverage by providing teams with the context and transparency needed... Read more »

Neurotechnology unveils new biometric recognition algorithms in MegaMatcher 13.0

Neurotechnology has released MegaMatcher 13.0 that provides a range of products for developing multi-biometric solutions that require high accuracy, speed and scalability. The latest release features MegaMatcher SDK, MegaMatcher... Read more »

Cloudflare Fraud Detection will provide precise tools to detect, categorize fraud

Cloudflare is entering the fraud detection market to help businesses identify and stop online fraud – including fraudulent transactions, fake account signups, account takeover attacks, and carding attacks –... Read more »

How Mirel Sehic relies on simplicity to focus on product security

If you are developing a modern medical, manufacturing, or logistics facility, there’s no doubt that a large portion of your investment was made into the electronic aspects of your... Read more »

Data loss prevention company hacked by Tick cyberespionage group

ESET researchers have uncovered a compromise of an East Asian data loss prevention (DLP) company. The attackers utilized at least three malware families during the intrusion, compromising both the... Read more »

So, you want to deploy air-gapped Kubernetes, huh?

So, you want to deploy Kubernetes in an air-gapped environment, but after months of grueling work, you’re still not up and running. Or maybe you’re just embarking on the... Read more »

Exfiltration malware takes center stage in cybersecurity concerns

While massive public data breaches rightfully raise alarms, the spike in malware designed to exfiltrate data directly from devices and browsers is a key contributor to continued user exposure,... Read more »

Best practices for securing the software application supply chain

As server-side security advances, more attackers are exploiting vulnerabilities and launching malicious attacks through the less protected and seldom monitored client-side supply chain. Unfortunately, because of these attacks’ sophisticated... Read more »

Top 50 most impersonated brands by phishing URLs

Today, phishing is the fastest growing Internet crime, and a threat to both consumers and businesses. Finance, technology, and telecom brands were the most commonly impersonated industries, notably for... Read more »
Subscribe to our Newsletter