Security Blog- 2026 2025 2024 2023 2022 2021 2020 2019 2018
AI blog APT blog Attack blog BigBrother blog BotNet blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog ICS blog Incident blog IoT blog Malware blog OS Blog Phishing blog Ransom blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
DATE | NAME | Info | CATEG. | WEB |
| 25.4.26 | Supply chain attacks hit Checkmarx and Bitwarden developer tools | Two supply chain attacks, same day, same command-and-control domain | Security blog | SOPHOS |
| 25.4.26 | Strengthening authentication with passkeys: A CISO playbook | Our passkey rollout took three tries. Here's a playbook to make your implementation smoother. | Security blog | SOPHOS |
| 25.4.26 | Sophos Firewall v22 MR1 is now available | Sophos Firewall v22 bolstered Secure by Design, taking it to a whole new level with major updates to the architecture and new features like the Health Check to help identify high-risk configurations. | Security blog | SOPHOS |
| 18.4.26 | More than pretty pictures: Wendy Bishop on visual storytelling in tech | Wendy shares the unique challenges and rewards of bridging the gap between artistic expression and highly technical research. | Security blog | CISCO TALOS |
| 28.3.26 | Virtual machines, virtually everywhere – and with real security gaps | Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves | Security blog | Eset |
| 14.3.26 | CISOs in a Pinch: A Security Analysis of OpenClaw | Learn about OpenClaw (a sovereign agent) and how this can be viable for enterprises. | Security blog | Trend Micro |
| 7.3.26 | Firewall Vulnerability Exploitation: Why the Edge is Fraying | There is a reasonable assumption baked into most enterprise security strategies: the firewall is the defender. It sits at the edge, it inspects traffic, it keeps the bad stuff out. Organizations spend real money on these devices specifically because of that assumption. | Security blog | Eclypsium |
| 7.3.26 | How SMBs use threat research and MDR to build a defensive edge | We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses | Security blog | Eset |
| 7.3.26 | Protecting education: How MDR can tip the balance in favor of schools | The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative? | Security blog | Eset |
| 28.2.26 | Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security | Industrial organizations are facing a growing paradox in cybersecurity. While operational technology (OT) environments are increasingly connected, most security strategies still assume threats will only materialize once attackers reach the plant floor. | Security blog | Palo Alto |
| 21.2.26 | Is it OK to let your children post selfies online? | When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech. | Security blog | Eset |
| 14.2.26 | SMS & OTP Bombing Campaigns: Evolving API Abuse Targeting Multiple Regions | Cyble analyzes expanding OTP/SMS bombing ecosystems using high‑speed APIs, SSL bypass, and cross‑platform automation. | Security blog | Cyble |
| 14.2.26 | When SPNs Go Rogue: Detection and Remediation with Trellix NDR | To address this detection gap, the blog shows how Trellix Network Detection and Response (NDR) detects Kerberoasting activity by analyzing deviations in identity behavior and comparing network-level telemetry. | Security blog | Trelix |
| 17.1.26 | AuraInspector: Auditing Salesforce Aura for Data Exposure | Mandiant is releasing AuraInspector, a new open-source tool designed to help defenders identify and audit access control misconfigurations within the Salesforce Aura framework. | Security blog | |
| 10.1.26 | How Cisco Talos powers the solutions protecting your organization | What happens under the hood of Cisco's security portfolio? Our reputation and detection services apply Talos' real-time intelligence to detect and block threats. Here's how. | Security blog |