Why did so many security vendors abandon MITRE’s stresstest?
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Elastic Security Labs discovered a new form of malware during a recent investigation (REF7707) that uses Micr...
Update Feb. 14, 2025: The Amsterdam police cybercrime team has seized 127 XHost servers. The bulletproof serv...
Advent International, Bain Capital, EQT AB and KKR are candidates for a takeover of Japan's Trend Micro. The ...
CyberArk has acquired Zilla Security for $165 million. It also increased its revenue by 33 percent in 2024 ov...
Indirect prompt injection is a fundamental technique to make chatbots perform malicious actions. Developers o...
1Password is set to become the exclusive Cybersecurity Partner at Oracle Red Bull Racing. After signing a mul...
Dutch and Spanish police recently arrested four major distributors of the criminal Sky ECC service. The suspe...
New research by Zscaler shows that organizations urgently need to improve their cyber resilience. While 94 pe...