Cyber Security

N-able brings AI to endpoint, security, and recovery

N-able announced enhanced AI capabilities across its platform to help organizati...

Conditional Access enforcement change coming to Microso...

Microsoft will change how Conditional Access policies are enforced in Microsoft ...

3 Decisions CISOs Need to Make to Prevent Downtime Risk...

Beyond the direct impact of cyberattacks, enterprises suffer from a secondary bu...

Sumsub’s AI Agent Verification binds automation to veri...

Sumsub announced the launch of its AI Agent Verification solution, an approach t...

Tosi Platform delivers unified connectivity, visibility...

Tosi customers worldwide gain access to the Tosi Platform, which unifies connect...

cside VPN Detection enables control of VPN traffic to p...

cside announced the launch of VPN Detection. The new solution enables businesses...

Google agrees to pay $135 million over Android data har...

Google agrees to pay $135 million to settle a proposed class action lawsuit brou...

SolarWinds Fixes Four Critical Web Help Desk Flaws With...

SolarWinds has released security updates to address multiple security vulnerabil...

Samsung tackles shoulder surfing on Galaxy devices

Our phones hold our most personal details, and we use them everywhere. On the bu...

SolarWinds fixes critical Web Help Desk RCE vulnerabili...

SolarWinds has fixed six critical and high-severity vulnerabilities in its popul...

Dynatrace RUM delivers end-to-end visibility for cloud-...

Dynatrace announced next-generation Real User Monitoring (RUM) capabilities that...

Google Disrupts IPIDEA — One of the World’s Largest Res...

Google on Wednesday announced that it worked together with other partners to dis...

Open-source malware zeroes in on developer environments

Open source malware activity during 2025 concentrated on a single objective: exe...

Hottest cybersecurity open-source tools of the month: J...

This month’s roundup features exceptional open-source cybersecurity tools that a...

A practical take on cyber resilience for CISOs

In this Help Net Security video, Shebani Baweja, CISO for Consumer, Private, Wea...

What motivates hackers and what makes them walk away

Most hackers spend more time learning, testing, and comparing notes than breakin...