News

Microsoft released what it describes as the most expansive 1-bit AI model to date, BitNet b1.58 2B4T. Unlike traditional ...
Security champions programs are a proven method for scaling security across large development teams. But building and implementing such a program is easier said than done.
Dr. Katie Paxton-Fear is an API security expert and Principal API security researcher at Traceable, in her words: she used to make APIs and now she breaks them. A former API developer turned API ...
Ransomware is off to a record-breaking start in 2025. What's driving the surge, and which industries are getting hit the hardest? This quarter’s cyber threat report uncovers some revealing trends, ...
Likely Chinese nation-state hackers are targeting European companies using previously unseen malware backdoor variants with advanced network tunneling and evasion capabilities for data theft. Brussels ...
Ransomware group Qilin posted at least 42 gigabytes of data stolen from a Texas pediatric orthopedic practice for sale on its darkweb leak site in February. In recent days, Central Texas Pediatric ...
Minnesota's largest nonprofit Medicaid dental practice is notifying nearly 135,000 people of a December 2024 data theft incident that potentially compromised their health and personal information, ...
Competing for customer loyalty in a digital world is hard. To add to this challenge, security teams must defend the business from motivated adversaries who have evolved their tactics to bypass ...
A whistleblower has accused staffers from the Department of Government Efficiency of attempting to cover their tracks while collecting troves of sensitive data from the independent labor agency's ...
Armed with billions of stolen records, fraudsters create synthetic identities to apply for credit cards, loans, and other types of credit causing unprecedented losses to financial institutions.
Managing risk complexities posed by multiple third-party vendors will always be a challenge. CISOs, security and compliance professionals are making third-party risk management a priority like never ...