The web browser is now the primary workspace for critical business tasks, yet it remains a major security blind spot,…
Read More »EDR
Entity category: technology
In late 2025, a Russia-aligned cyber group targeted Poland's critical infrastructure, exploiting a common vulnerability in internet-exposed Fortinet VPN devices…
Read More »A new malware strain can disable modern EDR solutions by exploiting an outdated, revoked-but-still-loadable kernel driver from old EnCase forensics…
Read More »Hackers exploited a revoked but still functional kernel driver from the EnCase forensic tool to disable endpoint security software, highlighting…
Read More »The global cybersecurity field offers diverse, high-demand career paths ranging from strategic leadership roles like Chief Information Security Officer (CISO)…
Read More »Samsung and Intel's new SmartPower HDR technology dynamically adjusts OLED panel power based on content, reducing energy use by up…
Read More »OpenAEV is a free, open-source platform for managing comprehensive adversary simulation campaigns, integrating technical testing with operational workflows and human…
Read More »Microsoft patched three actively exploited zero-day vulnerabilities in its October 2025 Patch Tuesday, including flaws in a pre-installed modem driver,…
Read More »AI-powered browsers introduce significant security vulnerabilities by embedding AI assistants that enable novel threats like malicious workflows and prompt injections,…
Read More »Genians, in partnership with RASInfotech, is advancing Universal Zero Trust Network Access (ZTNA) adoption and will showcase its capabilities at…
Read More »Australian organisations are shifting their cybersecurity focus to insider threats, with 84% expecting an increase and 58% ranking them as…
Read More »Akira ransomware attacks can achieve full network encryption in as little as four hours after initial VPN access, leaving organizations…
Read More »A large majority (89%) of enterprise AI usage is undetected by IT and security teams, posing significant data privacy and…
Read More »Swift and effective response to a cyberattack depends on having clarity, control, and a reliable lifeline already in place. Clarity…
Read More »Incident response planning, including tabletop exercises and red-team tests, significantly improves readiness and drives broader security investments. Endpoint detection and…
Read More »Traditional email security methods are insufficient against modern threats, prompting a shift toward more resilient, layered defenses similar to the…
Read More »Elastic denies claims of a zero-day remote code execution vulnerability in its Defend platform, refuting a public disclosure by AshES…
Read More »The cybersecurity job market is thriving in 2025, with high demand for skilled professionals across diverse sectors like cloud security,…
Read More »The cybersecurity industry is advancing with new AI-driven tools, including Elastic's AI SOC Engine for seamless threat detection and Black…
Read More »The Elastic AI SOC Engine (EASE) integrates AI-driven context awareness into existing security tools, improving threat prioritization and investigation efficiency…
Read More »


















