Acquisition positions Check Point asAa global leader in securing the full lifecycle of AI – from models to agents to data. Check Point® Software Technologies...
Coordinated action dismantles Phishing-as-a-Service network stealing Microsoft 365 credentials across 94 countries Cloudflare has announced its participation in a global operation with Microsoft and U.S....
Groundbreaking research reveals how PropellerAds and its parent AdTech Holding are enabling large-scale scams, malware distribution, and ad fraud. Infoblox Threat Intel has unveiled explosive...
New capabilities in Identity Security Insights® and Pathfinder Platform provide visibility, orchestration, and intelligence to govern AI agents securely. BeyondTrust, a global leader in identity...
New capabilities in the unified security platform reduce false positives, enable scaling, and keep threat coverage current. ManageEngine, the enterprise IT management division of Zoho...
New malware variant combines Petya/NotPetya traits with advanced bootkit capabilities, raising red flags for future threats ESET Research has revealed a new strain of ransomware...
Hybrid, multi-cloud and AI growth outpaces traditional defenses, creating blind spots and higher risks A new study by Tenable, in partnership with the Cloud Security...
Recovery times improve and ransom payments fall, but mounting staff stress and burnout reveal the hidden toll of cyberattacks The education sector is making strides...
New framework offers enterprises structured guidance to align security, operations, and compliance for responsible AI adoption The SANS Institute has launched its AI security blueprint “Own...
Veteran engineering leader to accelerate Confluent’s vision of real-time data streaming for AI, intelligence, and enterprise innovation Confluent has appointed Stephen Deasy as its new...