Russia’s ‘BlueAlpha’ APT Hides in Cloudflare Tunnels

Russia’s ‘BlueAlpha’ APT Hides in Cloudflare Tunnels
NEWS BRIEF BlueAlpha, a Russian state-sponsored advanced persistent threat (APT) group, has recently evolved its malware delivery chain to abuse ...
Read more

NAKIVO Launches v11 with Advanced Security Features for Virtualized Environments and Microsoft 365

NAKIVO Launches v11 with Advanced Security Features for Virtualized Environments and Microsoft 365
NAKIVO, a reputable vendor in data protection and disaster recovery, proudly announces the release of NAKIVO Backup & Replication v11. ...
Read more

Open Source Security Priorities Get a Reshuffle

Open Source Security Priorities Get a Reshuffle
Open source components aimed at connecting applications to cloud resources and those written in Python have jumped up the list ...
Read more

Safeguarding resilience in the age of outages: Essential actions for CIOs

Safeguarding resilience in the age of outages: Essential actions for CIOs
With technology now supporting almost every facet of business operations, the durability of IT systems and networks is increasingly crucial. ...
Read more

Microsoft Expands Access to Windows Recall AI Feature

Microsoft Expands Access to Windows Recall AI Feature
NEWS BRIEF Microsoft has expanded access for its Windows Recall feature to Copilot+ PCs that use AMD and Intel chipsets, ...
Read more

Cybersecurity Leader SonicWall Shares 2025 Outlook

Cybersecurity Leader SonicWall Shares 2025 Outlook
Cybersecurity leader SonicWall has just released their 2025 outlook, including the threats, challenges and trends that will shape the sector ...
Read more

Texas Teen Arrested for Scattered Spider Telecom Hacks

Texas Teen Arrested for Scattered Spider Telecom Hacks
Chasing down members of Scattered Spider, the cybercrime group known for their social engineering takedowns of massive organizations, has been ...
Read more

Living on the (Automated) Edge: How to Leverage Private Networks to Unleash the Power of AI Without Compromising Security

Living on the (Automated) Edge: How to Leverage Private Networks to Unleash the Power of AI Without Compromising Security
Businesses often have a strong aversion to being labeled a luddite. But implementing the latest technology can have swift, negative ...
Read more

Why SOC Roles Need to Evolve to Attract a New Generation

Why SOC Roles Need to Evolve to Attract a New Generation
COMMENTARY When I began my career, the security operations center (SOC) analyst role seemed like an exciting entry point into ...
Read more

Ransomware attacks cost $17 billion in downtime

Ransomware attacks cost  billion in downtime
Ransomware attacks have been a growing threat to businesses and individuals over the past several years, causing significant financial losses ...
Read more