Exposed and unaware: The state of enterprise security in 2025

The Edgescan 2025 Vulnerability Statistics Report offers a data-rich snapshot of the global cybersecurity landscape, drawing from thousands of assessments and penetration tests conducted in 2024. Now in its 10th year, the report analyzes full-stack sec… Continue reading Exposed and unaware: The state of enterprise security in 2025

Binarly Transparency Platform 3.0 prioritizes vulnerabilities based on active exploitation

Binarly announced the rollout of its flagship Binarly Transparency Platform 3.0, a major update that fuses live threat‑intelligence signals with an exploitation‑aware scoring system to help enterprise teams prioritize the mitigation of vulnerabilities … Continue reading Binarly Transparency Platform 3.0 prioritizes vulnerabilities based on active exploitation

You’ll Soon Be Able to Sign in to Have I Been Pwned (but Not Login, Log in or Log On)

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

How do seemingly little things manage to consume so much time?! We had a suggestion this week that instead of being able to login to the new HIBP website, you should instead be able to log in. This initially confused me because I’ve been used to logging on

Continue reading You’ll Soon Be Able to Sign in to Have I Been Pwned (but Not Login, Log in or Log On)

Coaching AI agents: Why your next security hire might be an algorithm

Security teams are drowning in alerts. The sheer volume of threats, suspicious activity, and false positives makes it nearly impossible for analysts to investigate everything effectively. Enter agentic AI, capable of completing hundreds of tasks simult… Continue reading Coaching AI agents: Why your next security hire might be an algorithm

A new era of cyber threats is approaching for the energy sector

Cyber threats targeting the energy sector come in many forms, including state-sponsored actors seeking to disrupt national infrastructure, cybercriminals motivated by profit, and insiders intentionally causing damage. The consequences of a successful a… Continue reading A new era of cyber threats is approaching for the energy sector

Operation SyncHole: Lazarus APT goes back to the well

Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach. Continue reading Operation SyncHole: Lazarus APT goes back to the well

Operation SyncHole: Lazarus APT goes back to the well

Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach. Continue reading Operation SyncHole: Lazarus APT goes back to the well

Review: Artificial Intelligence for Cybersecurity

Artificial Intelligence for Cybersecurity is a practical guide to how AI and machine learning are changing the way we defend digital systems. The book aims to explain how AI can help solve real cybersecurity problems. It does that well, but it’s not fo… Continue reading Review: Artificial Intelligence for Cybersecurity