Deepfakes are rewriting the rules of geopolitics

Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust reports that deepfakes were created every five minutes in 2024, while the European Parliament estimates that 8 million will circulate acros… Continue reading Deepfakes are rewriting the rules of geopolitics

Attackers test the limits of railway cybersecurity

Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how secure are they from a cybersecurity perspective? Like all industries, the rail… Continue reading Attackers test the limits of railway cybersecurity

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support

The Linux Kernel Runtime Guard (LKRG) is a kernel module that checks the Linux kernel while it’s running. It looks for signs of tampering and tries to catch attempts to exploit security flaws in the kernel. Because it’s a module and not a patch, LKRG c… Continue reading Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support

How to reclaim control over your online shopping data

Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to think about what happens to the data we leave behind, or the risks that might come with it? Where shopping data goes Retailers often store purch… Continue reading How to reclaim control over your online shopping data

Connected cars are smart, convenient, and open to cyberattacks

Consumers are concerned about vulnerabilities in their vehicles, which directly impacts purchasing behavior and brand loyalty, according to RunSafe Security. Vehicles now run on over 100 million lines of code, which is more than most fighter jets, but … Continue reading Connected cars are smart, convenient, and open to cyberattacks

Cutting through CVE noise with real-world threat signals

CISOs are dealing with an overload of vulnerability data. Each year brings tens of thousands of new CVEs, yet only a small fraction ever become weaponized. Teams often fall back on CVSS scores, which label thousands of flaws as “high” or “critical” but… Continue reading Cutting through CVE noise with real-world threat signals

Attackers are turning Salesforce trust into their biggest weapon

Salesforce has become a major target for attackers in 2025, according to new WithSecure research into threats affecting customer relationship management (CRM) platforms. The report shows that malicious activity inside Salesforce environments rose sharp… Continue reading Attackers are turning Salesforce trust into their biggest weapon

DDoS attacks serve as instruments of political influence and disruption

In the first half of 2025, there were 8,062,971 DDoS attacks worldwide, with EMEA taking the brunt at 3.2 million attacks, according to Netscout. Peak attacks reached speeds of 3.12 Tbps and 1.5 Gpps. These attacks have moved beyond simple disruption t… Continue reading DDoS attacks serve as instruments of political influence and disruption

How gaming experience can help with a cybersecurity career

Many people might not think that playing video games could help build a career in cybersecurity. Yet the skills gained through gaming, even if they don’t seem relevant at first, can be useful in the field. An overlooked pool of skills worth exploring T… Continue reading How gaming experience can help with a cybersecurity career

AI will drive purchases this year, but not without questions

AI is moving into security operations, but CISOs are approaching it with a mix of optimism and realism. A new report from Arctic Wolf shows that most organizations are exploring or adopting AI-driven tools, yet many still see risks that need management… Continue reading AI will drive purchases this year, but not without questions