Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
linkedin
Bluesky
GitHub
What are the ISO 27001:2022 controls?
Wultra Secures €3M to Protect Financial Institutions from Quantum Threats
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%
Aembit Announces Speaker Lineup for the Inaugural NHIcon
Future-gazing: How API Security Will Evolve in 2025
How to Optimize Test Management in Jira: Solutions for Common QA Challenges
How the SMS Hack Exposed U.S. Telecom Security Risks
Massive Credit Card Leak Discovered by LEAKD.COM
What You Need to Know about the Scholastic Data Breach
New cybersecurity threat-focused reports from ENISA
1Password product enhancements [Winter edition]: Mobile improvements, better item creation, and even more security features
Why GenAI Should Be a Deciding Factor With Email Security Investments
Staying One Step Ahead: The Value of an Early-Year Cybersecurity Checkup
Japan Attributes More Than 200 Cyberattacks to China Threat Actor "MirrorFace"
Securely bringing your own AI to Tines
Types of Spoofing Attacks
Mend Renovate Enterprise Cloud: Dependency Updates at Scale
CVE-2024-55591: Follow up: Authentication Bypass Vulnerability in Fortinet FortiOS and FortiProxy
Mitel MiCollab Vulnerabilities: CVE-2024-35286 and CVE-2024-41713
CrowdStrike Falcon for Legacy Systems: Modern Security for Legacy Environments
Breaking
Featured Posts
2025 Predictions - Navigating Through the Challenges and Opportunities Ahead
Jan 9, 2025
In
Protegrity
Sponsored By EVENTSENTRY
Capturing Network Traffic anytime
Jan 1, 2025
In
EventSentry
Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility
Dec 18, 2024
In
ThreatQuotient
The Key Steps to Ensuring DORA Compliance
Dec 13, 2024
In
Protegrity
2025 - A Year of Perpetual Change
Dec 6, 2024
In
JumpCloud
The Role of Data Security in Protecting Sensitive Information Across the Finance Industry
Nov 30, 2024
In
Protegrity
The Role of Data Recovery in Cyber Resilience
Nov 19, 2024
In
11:11 Systems
Building a Modern Identity Capability to Tackle DORA
Nov 13, 2024
In
JumpCloud
More Posts
Latest News
Wultra Secures €3M to Protect Financial Institutions from Quantum Threats
Jan 15, 2025
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%
Jan 15, 2025
Aembit Announces Speaker Lineup for the Inaugural NHIcon
Jan 15, 2025
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase
Jan 14, 2025
In
Snyk
Teleport 17
Jan 14, 2025
In
Teleport
Code Intelligence Launches Spark, Its AI Test Agent That Autonomously Uncovers Vulnerabilities Without Human Interaction
Jan 9, 2025
In
Code Intelligence
WatchGuard Acquires ActZero to Add Scalable and Open-Platform AI Security to Deliver Simplified 24/7 MDR Services
Jan 8, 2025
In
WatchGuard
WatchGuard Acquires ActZero to Accelerate Delivery of 24/7 MDR Services
Jan 8, 2025
In
WatchGuard
CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes
Jan 7, 2025
Security Risk Advisors joins the Microsoft Intelligent Security Association
Jan 7, 2025
1Password acquires Trelica, a trailblazer in SaaS access management
Jan 7, 2025
In
1Password
Egnyte Wins Big With Nine Comparably Awards in 2024
Jan 7, 2025
In
Egnyte
Feature Announcement: Enhancing ARMO Platform's Threat Detection and Response
Jan 7, 2025
In
ARMO
The AI SOC Analyst: How Torq Socrates Automates 90% of Tier-1 Analysis With Generative AI
Jan 7, 2025
In
Torq
More News
Latest Blogs
What are the ISO 27001:2022 controls?
Jan 16, 2025
In
Vanta
CrowdStrike Insider Risk Services Defend Against the Threats Within
Jan 15, 2025
In
CrowdStrike
1Password product enhancements [Winter edition]: Mobile improvements, better item creation, and even more security features
Jan 15, 2025
In
1Password
Operation 99: North Korea's Cyber Assault on Software Developers
Jan 15, 2025
In
SecurityScorecard
Staying One Step Ahead: The Value of an Early-Year Cybersecurity Checkup
Jan 15, 2025
In
Sedara
DORA Compliance: Checklist for 2025
Jan 15, 2025
In
Trilio
Major Supply Chain Cybersecurity Concerns and 7 Best Practices to Address Them
Jan 15, 2025
In
Ekran
Securely bringing your own AI to Tines
Jan 15, 2025
In
Tines
Why GenAI Should Be a Deciding Factor With Email Security Investments
Jan 15, 2025
In
Spambrella
CTI Roundup: PayPal Phishing, PLAYFULGHOST, and NonEuclid
Jan 15, 2025
In
Tanium
Mend Renovate Enterprise Cloud: Dependency Updates at Scale
Jan 15, 2025
In
Mend
Future-gazing: How API Security Will Evolve in 2025
Jan 15, 2025
In
Salt Security
Mitel MiCollab Vulnerabilities: CVE-2024-35286 and CVE-2024-41713
Jan 15, 2025
In
UpGuard
How to Optimize Test Management in Jira: Solutions for Common QA Challenges
Jan 15, 2025
In
GitProtect
New cybersecurity threat-focused reports from ENISA
Jan 15, 2025
In
Obrela
Japan Attributes More Than 200 Cyberattacks to China Threat Actor "MirrorFace"
Jan 15, 2025
In
KnowBe4
How the SMS Hack Exposed U.S. Telecom Security Risks
Jan 15, 2025
In
IDStrong
Massive Credit Card Leak Discovered by LEAKD.COM
Jan 15, 2025
In
IDStrong
Types of Spoofing Attacks
Jan 15, 2025
In
Arctic Wolf
What You Need to Know about the Scholastic Data Breach
Jan 15, 2025
In
IDStrong
More Blogs
Upcoming Events
Latest Customer Stories
Neo4j: Building a Secure Future with Sysdig CNAPP
Jan 14, 2025
In
Sysdig
Yahoo's AppSec Journey: Scaling Security with Mend.io
Jan 14, 2025
In
Mend
Managing identities in a growing organization: Lessons from SECURA Insurance
Jan 6, 2025
In
One Identity
How Data Net Solutions Group Found IT Success with 11:11 Systems
Nov 15, 2024
In
11:11 Systems
How Bot Expertise Stopped the Google Translate Bot Proxy Technique
Nov 13, 2024
In
Netacea
How ARMO Reduced Secrets Exposure with GitGuardian
Nov 12, 2024
In
GitGuardian
Visma's Security Boost with Aikido: A Conversation with Nikolai Brogaard
Nov 6, 2024
In
Aikido
How Clasp Consolidated Product Security Tooling with Jit
Oct 14, 2024
In
Jit
TDK Electronics Goes from Complexity to Confidence with CrowdStrike
Oct 7, 2024
In
CrowdStrike
Gamuda Transforms IT Operations with Cato Networks
Sep 24, 2024
In
Cato Networks
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.