Blog

February 6, 2025

macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed

February 6, 2025

11 security orchestration, automation, and response products — and how to choose

February 2, 2025

Hewlett Packard Enterprise and Juniper Networks strongly oppose Department of Justice’s decision to file suit to block acquisition

January 29, 2025

New Lumma Stealer campaign using fake Captchas

January 29, 2025

How Symantec Static Data Scanner Advanced Image Scanning Technology Is Staying Ahead of QR Code Phishing Attacks

January 29, 2025

Guidelines for the safe deployment of AI systems

January 29, 2025

Invisible Prompt Injection: A Threat to AI Security

January 27, 2025

Palo Alto Networks Prepares Organizations for Quantum Security with QRNG Open API

January 26, 2025

The 2025 AI Trends Turbocharging The Enterprise

January 26, 2025

Some Legends Are True

January 21, 2025

Unified Security: Why Broadcom Joined Symantec, Carbon Black

January 15, 2025

10 most powerful cybersecurity companies today

10 most powerful cybersecurity companies today. With AI and generative AI capabilities on the rise, a shift toward consolidation and platforms over point solutions is redefining […]
January 12, 2025

The 3-Step Configuration Review

Security products are frequently installed with the expectation that they will remain operational for years, even decades.
January 11, 2025

Recruitment Phishing Scam Imitates CrowdStrike Hiring Process

A newly discovered phishing campaign uses CrowdStrike recruitment branding to convince victims to download a fake application, which serves as a downloader for the XMRig cryptominer.
January 11, 2025

Catching the ghost in the machine: Adapting threat detection to cloud speed

Catching the ghost in the machine: Adapting threat detection to cloud speed The ghost in the machine flourishes within complexity, taking advantage of disconnected systems, limited […]