In this episode of Inside the Network, we sit down with Joe Levy, CEO of Sophos, a 40-year-old cybersecurity company…
Read More »Text messages used to be a safe space—quick birthday wishes, delivery updates, maybe the odd emoji from a friend. But…
Read More »Let’s face it—cybersecurity is no longer a game of building taller walls or thicker locks. The old rules, the ones…
Read More »If someone called you claiming to be a government official, would you know if their voice was real? This question…
Read More »Back in 2000, the Microsoft Security Response Center released an article titled “10 Immutable Laws of Security“, describing what they…
Read More »A significant security flaw, CVE-2025-53786, has been discovered in Microsoft Exchange Server hybrid environments. This flaw could enable attackers with on-premises administrative privileges to escalate their access within connected cloud…
The threat landscape for cybersecurity is changing at breakneck speed. Organizations are being bombarded with more creative attacks than ever before, and therefore, robust defense mechanisms become essential. Security information…
In December 2022, we released the open source OSV-Scanner tool, and earlier this year, we open sourced OSV-SCALIBR. OSV-Scanner and OSV-SCALIBR, together with OSV.dev are components of an open platform…
Contents Key facts of 2023’s data breaches January 2023: MailChimp Data Breach February 2023: Activision Data Breach March 2023: ChatGPT Data Breach April 2023: Shields Healthcare Group Data Breach May…
Endpoint Detection and Response (EDR) solutions have become fundamental components of modern cybersecurity strategies. As cyber threats grow more sophisticated, organizations need robust systems that can identify, analyze, and respond…
In partnership with NVIDIA and HiddenLayer, as part of the Open Source Security Foundation, we are now launching the first stable version of our model signing library. Using digital signatures…