News
CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Ente...
Checkmarx and CredShields aim to redefine enterprise application security for the decentralized era. Nearly half of the largest De...
SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSec...
SecurityMetrics' Shopping Cart Inspect (SCI) solutions has been selected as winner of the “Data Leak Detection Solution of the Yea...
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Sec...
SpyCloud released its report, The Identity Security Reckoning: 2025 Lessons, 2026 Predictions. The report outlines 10 of the top...
The First Autonomous AI Cyber Attack Exposed
The GTG-1002 is widely assessed as the first large-scale cyber attack executed with near complete AI autonomy. It simultaneously m...
How Cartesi's New Fraud-Proof System Could Change Rollup Security Forever
Cartesi launches Honeypot v2 with Permissionless Refereed Tournaments, introducing bond mechanisms that protect validators from de...
ThreatBook Peer-Recognized as a Strong Performer In the 2025 Gartner Peer Insigh...
ThreatBook has been recognized as a Strong Performer in the 2025 Gartner Peer Insights of the Customer for Network Detection and R...
AI Is in Production. Security Isn’t. That Gap Is Costly.
78% of organizations run AI in production. Half have no AI-specific security. The damage is measurable: a $25M deepfake wire trans...
2025 Insider Risk Report Finds Most Organizations Struggle To Detect And Predict...
93% of security leaders say insider threats are as difficult or harder to detect than external cyberattacks. Only 23% express stro...
Beyond Data: The Rising Need for AI Security
Data Security has long been the cornerstone of enterprise cybersecurity strategies. But as artificial intelligence becomes deeply...
npm's New Token Limits Won't Stop the Attacks That Actually Happen
npm's new token lifetime limits (90-day max, 7-day default) and mandatory WebAuthn are good security hygiene, but they don't addre...
IoMT Vulnerabilities Putting Patient Health Data at Risk
Healthcare is experiencing an unprecedented explosion in connected medical devices. From smartwatches monitoring heart rhythms to...
