BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023

Refreshed software and collaboration with the security researcher community may have contributed to the 5% drop. Read more »

OpenAI’s GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities, Study Finds

Researchers from the University of Illinois Urbana-Champaign found that OpenAI’s GPT-4 is able to exploit 87% of a list of vulnerabilities when provided with their NIST descriptions. Read more »

Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams

About 23% of security teams include women, ISC2 found in its Cybersecurity Workforce Study. Read more »

Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape

A new report by cyber security firm Radware identifies the four main impacts of AI on the threat landscape emerging this year. Read more »

NIST Cybersecurity Framework: A Cheat Sheet for Professionals (Free PDF)

The tech world has a problem: Security fragmentation. There’s no standard set of rules or even language for mitigating cyber risk used to address the growing threats of hackers,... Read more »

Can a VPN Be Hacked?

Learn about the potential vulnerabilities of VPNs and the measures you can take to enhance your VPN security. Read more »

Breakthrough in Quantum Cloud Computing Ensures its Security and Privacy

Oxford University researchers used an approach dubbed “blind quantum computing” to connect two quantum computing entities in a way that is completely secure. Read more »

Kaspersky Study: Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

Nearly 10 million devices were infected with data-stealing malware in 2023, with criminals stealing an average of 50.9 credentials per device. Read more »

TechRepublic’s Review Methodology for Password Managers

Our review methodology for password managers involves extensive research, expert analysis and first-hand experience. Read more »

TechRepublic’s Review Methodology for VPNs

Our review methodology for virtual private networks involves comprehensive research, expert analysis and first-hand experience. Read more »
Subscribe to our Newsletter