Cyber Security

A year in, Zoom’s CISO reflects on balancing security a...

In this Help Net Security interview, Sandra McLeod, CISO at Zoom, reflects on he...

Ransomware, fraud, and lawsuits drive cyber insurance c...

The 2026 InsurSec Report from At-Bay, covering more than 100,000 policy years of...

GDPR works, but only where someone enforces it

A new measurement study of web tracking across ten countries offers a reality ch...

'The Gentlemen' Rapidly Rises to Ransomware Prominence

Not nearly as polite as the name suggests, the ransomware gang has impressed res...

Google’s Workspace Intelligence promises privacy while ...

Security and data governance are among the key considerations in Google’s latest...

Malicious KICS Docker Images and VS Code Extensions Hit...

Cybersecurity researchers have warned of malicious images pushed to the official...

Self-Propagating Supply Chain Worm Hijacks npm Packages...

Cybersecurity researchers have flagged a fresh set of packages that have been co...

Claude Mythos finds 271 Firefox flaws, Mozilla believes...

The Mozilla Foundation tested Claude Mythos, an Anthropic AI model that has stir...

Cyberattack on French government agency triggers phishi...

France Titres, a French government agency, has disclosed a data breach that may ...

Harvester Deploys Linux GoGra Backdoor in South Asia Us...

The threat actor known as Harvester has been attributed to a new Linux version o...

Acronis GenAI Protection gives MSPs control over AI usa...

Acronis has launced Acronis GenAI Protection, a monitoring and security solution...

New Mirai variants target routers and DVRs in parallel ...

Hidden inside newly discovered botnet malware is an unusual message from its cre...

Prove Identity Platform connects verification, authenti...

Prove has launched the Prove Identity Platform, turning identity verification in...

Claude Mythos finds 271 Firefox flaws, Mozilla believes...

The Mozilla Foundation tested Claude Mythos, an Anthropic AI model that has stir...

DPRK Fake Job Scams Self-Propagate in 'Contagious Inter...

A compromised developer's repository serves as a worm-like infection vector to s...

Progress Software fixes sneaky WAF bypass vulnerability...

Progress Software has fixed a slew of high-severity vulnerabilities in MOVEit WA...