Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Verizon: Pretexting Now Tops Phishing in Social Engineering Attacks
Why Companies Have Great Success Training Employees With Simulated Phishing Tests
10 Major Retail Industry Cyber Attacks
MOVEit File Transfer Zero-day Compromises Multiple Organizations
How Threat Intelligence Drives Efficiency in an Economic Downturn
Weekly Cyber Security News 08/06/2023
Analyzing 3 Offensive AI Attack Scenarios
Which Critical Vulnerabilities Discovered in 2023 Can Do Serious Damage? Read Our Report
Five Leadership Tips to Set Up Your Business for AppSec Success
Fireblocks and MetaMask Institutional Integrate to Enhance DeFi Experience for Institutions
Cybersecurity and Proxy Season: What Business Executives and Risk Leaders Need to Know
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace
Don't Let Complicated RFP Problems Slow Down Your Business
Case study: Calico enables zero-trust security and policy automation at scale in a multi-cluster environment for Box
Using social media as a tool to share knowledge on day-to-day Cybersecurity risks
SafeBreach Coverage for US-CERT Alert (AA23-158A) - CVE-2023-3462 MOVEit Vulnerability
Offbeat Social Engineering Tricks in a Scammer's Handbook
Clop Ransomware Likely Sitting on MOVEit Transfer Vulnerability (CVE-2023-34362) Since 2021
The Top 10 Questions about the GPL License - Answered!
Reasons to Stick with Open Source Velero for your Kubernetes Backup and Recovery
Breaking
Featured Posts
A Broken Industry - 'Changing the narrative of the 'war on cybercrime'
May 31, 2023
In
Centripetal
Growing Digital Ecosystems, Increasing Cybersecurity Risk, Fragmented Regulations and Economic Challenges Emphasizes Need for Holistic API Security
May 30, 2023
In
Noname Security
Sponsored By KONDUKTO
Winning Management Support as an AppSec Leader
May 29, 2023
In
Kondukto
GDPR - the benchmark for a global privacy framework
May 25, 2023
In
Protegrity
Cyber Warfare and Government Attitudes To Cybersecurity
May 19, 2023
In
SafeBreach
Understand how Cyber Threat Intelligence can best leverage the capabilities of network detection and response
May 19, 2023
In
ThreatQuotient
Sponsored By CYBRIANT
The CIOs Guide to Preventing Ransomware Attacks
May 16, 2023
In
Cybriant
Password Managers: Here to stay?
May 3, 2023
In
One Identity
More Posts
Latest News
Outpost24 acquires external attack surface management provider Sweepatic to reduce risk exposure of internet facing assets
Jun 7, 2023
In
Outpost 24
Domain and IP intelligence with alphaMountain and LimaCharlie
Jun 7, 2023
In
LimaCharlie
Respond Instantly to Kubernetes Threats with Sysdig Live
Jun 7, 2023
In
Sysdig
Passkeys in iOS 17: Watch a sneak peek at what's coming to 1Password for iOS
Jun 7, 2023
In
1Password
Introducing cases in Tines
Jun 7, 2023
In
Tines
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM
Jun 7, 2023
In
Snyk
Reduce risk to your supply chain with a software bill of materials (SBOM)
Jun 7, 2023
In
Snyk
WatchGuard Wins Two Fortress Cyber Security Awards
Jun 7, 2023
In
WatchGuard
TrustCloud Releases World's First Free Security Questionnaire Tool and Compliance Sharing Portal for Startups
Jun 6, 2023
In
TrustCloud
Snyk scanning capabilities are now embedded in Jira Software
Jun 6, 2023
In
Snyk
Now in beta: Save and sign in with passkeys using 1Password in the browser
Jun 6, 2023
In
1Password
Mend.io Announces Integration of Crowdsourced Renovate Data to Reduce Open Source Attack Surface Risk Up to 80 Percent
Jun 5, 2023
In
Mend
Keeper Wins Prestigious CHIP Test of Password Managers
Jun 5, 2023
In
Keeper
Announcing GitHub Code Scanning integration
Jun 5, 2023
In
Bearer
More News
Latest Blogs
Analyzing 3 Offensive AI Attack Scenarios
Jun 8, 2023
In
CyberArk
Weekly Cyber Security News 08/06/2023
Jun 8, 2023
In
ionCube24
Five Leadership Tips to Set Up Your Business for AppSec Success
Jun 8, 2023
In
Veracode
Which Critical Vulnerabilities Discovered in 2023 Can Do Serious Damage? Read Our Report
Jun 8, 2023
In
Rezilion
Cybersecurity and Proxy Season: What Business Executives and Risk Leaders Need to Know
Jun 8, 2023
In
BitSight
Fireblocks and MetaMask Institutional Integrate to Enhance DeFi Experience for Institutions
Jun 8, 2023
In
Fireblocks
Don't Let Complicated RFP Problems Slow Down Your Business
Jun 8, 2023
In
Trustwave
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace
Jun 8, 2023
In
Snyk
Using social media as a tool to share knowledge on day-to-day Cybersecurity risks
Jun 8, 2023
In
AT&T Cybersecurity
Offbeat Social Engineering Tricks in a Scammer's Handbook
Jun 8, 2023
In
Tripwire
The Top 10 Questions about the GPL License - Answered!
Jun 8, 2023
In
Mend
SafeBreach Coverage for US-CERT Alert (AA23-158A) - CVE-2023-3462 MOVEit Vulnerability
Jun 8, 2023
In
SafeBreach
Clop Ransomware Likely Sitting on MOVEit Transfer Vulnerability (CVE-2023-34362) Since 2021
Jun 8, 2023
In
Kroll
Cloudflare Area 1 earns SOC 2 report
Jun 8, 2023
In
Cloudflare
Reasons to Stick with Open Source Velero for your Kubernetes Backup and Recovery
Jun 8, 2023
In
CloudCasa
From Admin to AdminPlusPlus: Breaking Out of Sandboxed Applications Through Recon, Being Brave and Abusing SSO Domain Account Mappings
Jun 8, 2023
In
Trustwave
Millions of Patients Lose Control of Their Personal and Health Data in Harvard Pilgrim Breach
Jun 8, 2023
In
IDStrong
Russian Investigator Detained After Taking 1,000 Bitcoin Bribe From Hackers
Jun 8, 2023
In
ImmuniWeb
AppSec Decoded: Ease of use with Polaris
Jun 8, 2023
In
Synopsys
10 Major Retail Industry Cyber Attacks
Jun 8, 2023
In
Arctic Wolf
More Blogs
Upcoming Events
Latest Customer Stories
Case study: Calico enables zero-trust security and policy automation at scale in a multi-cluster environment for Box
Jun 8, 2023
In
Tigera
How Thales Group Uses the ThreatQ Platform to Build its Leading Threat Intelligence Service
May 30, 2023
In
ThreatQuotient
Improved Security Without Adding Friction - Aspen Skiing Company + Netskope
May 26, 2023
In
Netskope
Case study: Calico on AWS enables turnkey networking and security for Rafay's enterprise-grade Kubernetes Operations Platform
May 26, 2023
In
Tigera
Bureau Veritas mitigates risk with OneLogin
May 24, 2023
In
One Identity
A TrustCloud Trustimonial: Sevco Security
May 23, 2023
In
TrustCloud
Case study: Calico Enterprise empowers Aldagi to achieve EU GDPR compliance
May 18, 2023
In
Tigera
Identity security and zero trust at Volksbank
May 11, 2023
In
One Identity
Protecting all your data with identity governance
May 11, 2023
In
One Identity
Netskope Protects APIs from Hackers with Noname Security
May 9, 2023
In
Noname Security
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.