Your Online Resource for the Latest News in Cybersecurity

Our picks

Jericho Security Secures $15M for AI Cyber Training Expansion
Jericho Security Secures $15M for AI Cyber Training Expansion

In the rapidly evolving domain of cybersecurity, the challenge of defending against increasingly sophisticated threats is ever-present. Jericho Security Inc., a startup founded in 2023, has recently made headlines by securing $15 million in funding t

Microsoft and AWS Patch Critical Security Flaws in Latest Updates
Microsoft and AWS Patch Critical Security Flaws in Latest Updates

Malik Haidar is a cybersecurity expert with extensive experience combating threats within multinational corporations. Known for his expertise in integrating business perspectives into cybersecurity strategies, Haidar's insights are highly sought afte

Are Healthcare and Pharma Safe From ResolverRAT Malware Attacks?
Are Healthcare and Pharma Safe From ResolverRAT Malware Attacks?

Understanding the Context and Importance of ResolverRAT in the Healthcare and Pharma SectorsThe healthcare and pharmaceutical sectors face the increasing threat of sophisticated ResolverRAT malware, raising crucial concerns regarding operational cont

Oracle Deploys 378 Security Patches in April 2025 Update
Oracle Deploys 378 Security Patches in April 2025 Update

With the recent release of 378 security patches, Oracle has showcased its significant commitment to cybersecurity. This comprehensive update covers a wide range of products, addressing an impressive array of vulnerabilities. Multiple experts in the f

Global Cyber Espionage: Emerging Tactics and Sophisticated Threats
Global Cyber Espionage: Emerging Tactics and Sophisticated Threats

In an age of increasing digital interconnectedness, cyber espionage remains a significant concern for both governments and corporations. Advanced Persistent Threats (APTs) have evolved considerably, employing new tactics and sophisticated tools to in

Essential Steps for Effective Penetration Testing Planning
Essential Steps for Effective Penetration Testing Planning

In this interview, Kristen Papadaikis engages with Malik Haidar, a cybersecurity expert known for his extensive work in combating threats within multinational corporations. Malik provides insight into the nuances of penetration testing, offering prof

How Will Cyware Revolutionize Threat Intel with AI?
How Will Cyware Revolutionize Threat Intel with AI?

Malik Haidar is a cybersecurity expert recognized for his prowess in defending against cyber threats for global companies. Known for synthesizing analytic methodologies with practical security implementations, Malik Haidar integrates business insight

Scammer Steals Rs 2 Lakh Using Credit Card and Spyware Heck
Scammer Steals Rs 2 Lakh Using Credit Card and Spyware Heck

A recent case involving a Maharashtra government employee has highlighted the sophisticated methods that scammers are using to deceive individuals and steal their money. Shridhar Mahuli, the victim, fell prey to a scam when he received a phone call f

Are AI-Driven Tax Scams Putting Your Financial Data at Risk?
Are AI-Driven Tax Scams Putting Your Financial Data at Risk?

In a rapidly evolving digital landscape, tax season has become a prime time for cybercriminals to exploit unsuspecting individuals. The rise of artificial intelligence (AI) has added a new dimension to these scams, enabling criminals to create highly

PlayPraetor Reloaded Poses Global Threat to Android Users
PlayPraetor Reloaded Poses Global Threat to Android Users

In this engaging interview, we have Malik Haidar, a cybersecurity expert with extensive experience in combating threats and hackers within multinational corporations. His expertise spans across analytics, intelligence, and security with a particular

NIS2 Directive: Strengthening EU Cybersecurity for Digital Resilience
NIS2 Directive: Strengthening EU Cybersecurity for Digital Resilience

Context and SignificanceThe rapid advancement of technology and the proliferation of digital services have made cybersecurity a critical concern for businesses and governments alike. The NIS2 Directive, recently enacted by the European Union, aims to

How Does the NIS 2 Directive Strengthen EU Cybersecurity?
How Does the NIS 2 Directive Strengthen EU Cybersecurity?

With the surge in cyber-attacks targeting critical sectors, questions on the robustness of the European Union's cybersecurity framework have never been more relevant. The situation forces us to ponder: Is the current state of cybersecurity in the EU

Qevlar AI Raises $14M to Boost SOCs with Advanced Autonomous AI
Qevlar AI Raises $14M to Boost SOCs with Advanced Autonomous AI

Qevlar AI recently announced an impressive funding achievement, securing $14 million to transform Security Operations Centers (SOCs) with its innovative agentic AI technology. This investment, mainly led by EQT Ventures and Forgepoint Capital Interna

Are UK SMEs Losing Billions Due to Weak Cybersecurity?
Are UK SMEs Losing Billions Due to Weak Cybersecurity?

Cybersecurity weaknesses are costing UK small and medium-sized enterprises (SMEs) billions annually, as highlighted in a detailed report by Ryan Daws. The findings, based on a comprehensive study conducted by Vodafone Business, reveal the staggering

Scientists Predict Future with Decentralized Collective AI
Scientists Predict Future with Decentralized Collective AI

Malik Haidar is a cybersecurity expert with extensive experience in combating threats and hackers within multinational corporations. His expertise encompasses analytics, intelligence, and security, with a strong focus on integrating business perspect

Australia's Defense Budget Rise: Aligning Spending with Future Threats
Australia's Defense Budget Rise: Aligning Spending with Future Threats

Australia is significantly increasing its defense budget, highlighting a strategic commitment to enhancing national security capabilities. This rise in spending, particularly under the current government, is influenced by both regional tensions and p

Editorial

What’s Next for Business Security (Spoiler: It’s Game-Changing)

Only four months in, and 2025 has already experienced a meteoric rise in business security threat sophistication—ranging from devastating deepfake deceptions to telephonic communication interceptions. Overcoming these obstacles demands that organizations reevaluate their security strategies, as cybercriminals quickly catch on to the advanced technologies powering modern business operations—and sub

How to Keep Your B2B Payments Hack-Proof
How to Keep Your B2B Payments Hack-Proof

A secure payment system (SPS)  includes the technology and processes that protect sensitive information. It protects personal information and credit card details from unauthorized access during checkout, ensuring that data is processed, sent, and stored securely. Whether they focus on online shopping or banking, businesses must diligently keep accounts safe from fraud, data breaches, and

View All

Analytics Intelligence

Urgent Patch Needed for Critical Commvault Vulnerability
Urgent Patch Needed for Critical Commvault Vulnerability

A critical software vulnerability, CVE-2025-34028, has been identified within Commvault's Command Center that allows remote attackers to execute arbitrary code without authentication. This high-risk issue, given a severity score of 10.0, poses a significant threat to organizations relying on Commvault for tasks such as restoring user emails and conducting data recovery operations. Without swift intervention, this vulnerability could potentially lead to unauthorized access, data breaches, or complete control over vital system resources. The flaw

View All
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address