Please turn on your JavaScript for this page to function normally.
API security
89% of AI-powered APIs rely on insecure authentication mechanisms

APIs have emerged as the predominant attack surface over the past year, with AI being the biggest driver of API security risks, according to Wallarm. “Based on our findings, …

Hide My Email
How to use Hide My Email to protect your inbox from spam

Hide My Email is a service that comes with iCloud+, Apple’s subscription-based service. It allows users to generate one-time-use or reusable email addresses that forward …

North Korea
How Lazarus Group built a cyber espionage empire

Since September 2024, SecurityScorecard’s STRIKE team has been investigating Lazarus Group’s activity, uncovering key details about their infrastructure. Despite …

data breach trends
Cybersecurity crisis in numbers

The number of US data compromises in 2024 (3,158) decreased 1% compared to 2023 (3,202), 44 events away from tying a record for the number of compromises tracked in a year, …

compliance
SEC and FCA fines: Issues jump

The financial sector faces communication compliance challenges as organizations struggle to maintain oversight across communication channels. Adding to the complexity is the …

Biohazard
Only 13% of organizations fully recover data after a ransomware attack

Ransomware attacks are disrupting and undermining business operations and draining revenue streams, according to Illumio. Findings from the study reveal that 58% of …

strategy
74% of CISOs are increasing crisis simulation budgets

In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, 23andMe, Transport for London, and Cencora, CISOs are reassessing their …

AI
AI security posture management will be needed before agentic AI takes hold

As I’m currently knee deep in testing agentic AI in all its forms, as well as new iterations of current generative AI models such as OpenAI’s O1, the complexities of securing …

cybersecurity tools
Don’t let these open-source cybersecurity tools slip under your radar

This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber attacks, monitor …

strategy
Cyber trends set to influence business strategies

Diligent convened a group of 65 board members, C-suite executives, and leading subject matter experts to explore topics shaping the future of business: generative AI, …

Apple App Privacy Report
How to use Apple’s App Privacy Report to monitor data tracking

The App Privacy Report, which Apple introduced in iOS 15.2, allows users to monitor how apps access data and interact with third-party services. The report provides an …

cybersecurity week in review
Week in review: 48k Fortinet firewalls open to attack, attackers “vishing” orgs via Microsoft Teams

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 48,000+ internet-facing Fortinet firewalls still open to attack Despite last …

Don't miss

Cybersecurity news