Mar 14, 2025Ravie LakshmananMobile Security / Encryption The GSM Association (GSMA) has formally announced support for end-to-end...
[email protected] The Hacker News
Mar 14, 2025The Hacker NewsData Protection / Ransomware Cyber threats evolve daily. In this live webinar, learn...
Most microsegmentation projects fail before they even get off the ground—too complex, too slow, too disruptive. But...
Mar 14, 2025Ravie LakshmananSoftware Security / Cybercrime Users searching for pirated software are the target of a...
Mar 14, 2025Ravie LakshmananThreat Intelligence / Malware A new malware campaign has been observed leveraging social engineering...
Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online...
The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android...
Mar 13, 2025Ravie LakshmananAuthentication / Vulnerability Two high-severity security flaws have been disclosed in the open-source ruby-saml...
As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical data. With...
Mar 13, 2025Ravie LakshmananOpen Source / Vulnerability Meta has warned that a security vulnerability impacting the FreeType...