Menu

Latest articles

What cybersecurity actually does for your business The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed
Update to 2.87.3
Update to 145.0.7632.116 * CVE-2026-3061: Out of bounds read in Media * CVE-2026-3062: Out of bounds read and write in Tint * CVE-2026-3063: Inappropriate implementation in DevTools
Update to 2.69.4
Rename from golang-github-prometheus and upgrade to 3.10.0
hex_core ver. 0.12.2
Rename from golang-honnef-tools and update to 2026.1
MCP C# SDK 1.0 arrives with improved authorization server discovery
Firefox taps Anthropic AI bug hunter, but rancid RAM still flipping bits
Spyware disguised as emergency-alert app sent to Israeli smartphones
How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down
Cisco warns of two more SD-WAN bugs under active attack
Microsoft spots ClickFix campaign getting users to self-pwn on Windows Terminal
Son of government contractor arrested after alleged $46M crypto heist from US Marshals
Microsoft finally gets around to fixing Windows 10 Recovery Environment after breaking it in October
Microsoft finally gets around to fixing Windows 10 Recovery Environment after breaking it in October
Transport for London says 2024 breach affected 7M customers, not 5,000
Transport for London says 2024 breach affected 7M customers, not 5,000
Why local-first matters for JavaScript
Why enterprises are still bad at multicloud
An update that solves one vulnerability and contains one feature can now be installed.
An update that solves three vulnerabilities can now be installed.
An update that solves three vulnerabilities can now be installed.
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. For the oldstable distribution (bookworm), these problems have been fixed in version 145.0.7632.159-1~deb12u1.
Important: postgresql16 security update
Important: postgresql16 security update
Rust 1.94 arrives with array windows to iterate slices
Google says spyware makers and China-linked groups dominated zero-day attacks last year
Google says spyware makers and China-linked groups dominated zero-day attacks last year
Visual Studio Code previews agent plugins
Iran intelligence backdoored US bank, airport, software outfit networks
Iran intelligence backdoored US bank, airport, software outfit networks
UK watchdog eyes Meta’s smart glasses after workers say they ‘see everything’
UK watchdog eyes Meta’s smart glasses after workers say they ‘see everything’
How SMBs use threat research and MDR to build a defensive edge We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses
The revenge of SQL: How a 50-year-old language reinvents itself
What I learned as an undercover agent on Moltbook
OpenAI developing GitHub rival as AI coding platform race intensifies
Smashing Security podcast #457: How a cybersecurity boss framed his own employee
WebAssembly proposal touted to improve Wasm web integration
MCP security: Implementing robust authentication and authorization
https://security-tracker.debian.org/tracker/DSA-6157-1
‘Hundreds’ of Iranian hacking attempts have hit surveillance cameras since the missile strikes
‘Hundreds’ of Iranian hacking attempts have hit surveillance cameras since the missile strikes
Malware-laced OpenClaw installers get Bing AI search boost
LexisNexis confirms data breach at Legal & Professional arm, some customer records affected
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
Linux Security Strategies for Cloud and IoT Environments
Protecting education: How MDR can tip the balance in favor of schools The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?
An ode to craftsmanship in software development