New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones…

AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks

A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since…

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is…

Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims

A new phishing technique called “file archiver in the browser” can be leveraged to “emulate” a…

Barracuda Discloses Breach Of Some Email Security Customers Due To Zero-Day Vulnerability

Barracuda said that some Email Security Gateway customers were impacted by a breach last week that…

Qualys CEO: CISOs Are Now More Engineering Oriented, Less About Compliance

According to a research report by security vendor Qualys, on average, a software vulnerability in 2022…


TCS Expands Google Cloud Relationship With Vertex Generative AI

‘What is really special is the fact that we are bringing the best from Google and…

Claroty Unveils MSSP Partnerships with IBM, Rockwell Automation, NTT Data, eSentire, and More

– Claroty, the cyber-physical systems protection company, today announced the global expansion of its FOCUS Partner Program…

Prevalent Expands Industry-Leading Third-Party Risk Management Platform; Delivering First Solution that Addresses Compliance, Security and Supply Chain Risks

Prevalent, Inc., the company that takes the pain out of third-party risk management (TPRM), today announced the latest…

SentinelOne CEO On Microsoft’s Security Copilot: ‘It’s A Nice Chatbot’

Weingarten On The Record Around the cybersecurity industry, numerous vendors have debuted new products powered by generative AI…