The Impossible Omelette: Chinese APT Delivers ‘EggStreme,’ a Fileless Malware Invisible to Antivirus
Bitdefender will unpack the malware’s stealth and TTPs at RSA.
The Stryker Cyberattack from a CISO’s Point of View
Meet the 'wipe' button protagonist: Dave Nathans, Stryker’s Chief Information Security Officer.
Microsoft Ignite 2025: The Identity Security Playbook for a World Run by AI Agents
Microsoft asserts that AI agents will soon surpass human workers, necessitating their governance similar to employees for security.
Cyber Monday Shopping Surge Fuels Wave of 2,000+ Fake Retail Sites
Experts warn of over 2,000 holiday-themed fake retail websites active during Cyber Monday, creating a prime opportunity for fraud as online sales are projected at $14.2 billion.
Roblox Makes Facial Age Checks Mandatory, Raising the Bar on Youth Identity Online
With 150 million daily users and growing legal scrutiny, Roblox’s new age-assurance rules could set a de facto standard that TikTok, Meta and others are pushed to match.
Bugcrowd Races Rivals to Combine AI and Human Testing in AppSec Shake-Up
Bugcrowd acquired Mayhem Security to enhance vulnerability detection by merging ethical hacking with AI automation.
Email Sender Spoof Flaw Hits Microsoft, CERT Warns
The flaw is rooted in ambiguous syntax rules in long-standing email standards that allow emails to appear to come from someone else.
The Real Cyber Battle Now Is for Trust: Not Access
In 2025, cybersecurity's primary challenge shifts from access control to trust. The focus is on verifying machine decisions and ensuring credibility amidst increasing AI and disinformation threats.
Resilience and Secure by Design Are Replacing Patch and Pray
NVIDIA's Black Hat 2025 session highlighted its shift to RISC-V architecture for security, emphasizing engineering trust over patching, with a focus on proof-based design and resilience in its billion-core ecosystem.