WhatsApp now lets you secure chat backups with passkeys

Messaging service WhatsApp is launching passkey-encrypted chat backups for iOS and Android, allowing users to encrypt their stored message history using their face, fingerprint, or device screen-lock code. Backups have long been a weak link in messagin… Continue reading WhatsApp now lets you secure chat backups with passkeys

Hottest cybersecurity open-source tools of the month: October 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Chekov: Open-source static code analysis tool Checkov is an open-source tool designed to help t… Continue reading Hottest cybersecurity open-source tools of the month: October 2025

Email breaches are the silent killers of business growth

78% of organizations were hit by an email breach in the past 12 months, according to the Email Security Breach Report 2025 by Barracuda. Phishing, impersonation, and account takeover continue to drive incidents that often lead to ransomware and data lo… Continue reading Email breaches are the silent killers of business growth

72 states sign first global UN Convention against Cybercrime

The world’s first global convention to prevent and respond to cybercrime opened for signature today in Hanoi, Vietnam, and will remain open at United Nations Headquarters in New York until 31 December 2026. Adopted by the UN General Assembly in Decembe… Continue reading 72 states sign first global UN Convention against Cybercrime

AI writes code like a junior dev, and security is feeling it

The industry is entering a phase where code is being deployed faster than it can be secured, according to OX Security. Findings from the Army of Juniors: The AI Code Security Crisis report show that AI-generated code often appears clean and functional … Continue reading AI writes code like a junior dev, and security is feeling it

Product showcase: Neo Network Utility makes network checks simple

Want to see if a remote server is still alive, or trace the path your data takes across the internet? Network Utility had you covered, until Apple removed it. Network Utility was the go-to macOS app for quick network checks. It gave you a graphical way… Continue reading Product showcase: Neo Network Utility makes network checks simple

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers describe a year in which criminal and state-backed actors blurred the lines between cybercrime, esp… Continue reading What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

When AI writes code, humans clean up the mess

AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with a price. A new report from Aikido Security shows that most organizations now use AI to write production code, and many have seen n… Continue reading When AI writes code, humans clean up the mess