Dutch Ministry of Finance portal offline after cyberattack
The cyberattack, detected after a third-party alert, led to unauthorized access to internal systems within the policy department.
20 articles
The cyberattack, detected after a third-party alert, led to unauthorized access to internal systems within the policy department.
Spalletta is accused of exploiting vulnerabilities in Uranium Finance's smart contracts on two separate occasions in April 2021.
Five facts critical infrastructure (CI) leaders need to act on in 2026, grounded in what Microsoft Threat Intelligence is observing across sectors right now....
Pondurance announced MDR Essentials, MDR Essentials, an MDR service providing an autonomous SOC that reduces the time from threat detection to containment by...
Researchers at numerous firms are sounding warnings about the supply-chain attack on an open-source project with 100 million weekly downloads. The post Attac...
AWS Security Agent on-demand penetration testing is now generally available, enabling you to run comprehensive security tests across all your applications, n...
Amazon’s latest AI capabilities bring on-demand penetration testing through the AWS Security Agent, alongside the AWS DevOps Agent. “These agents are changin...
Read actionable advice for CISOs on securing AI, managing risk, and applying core security principles in today’s AI‑powered environment. The post Applying se...
The latest funding round brings the total venture capital investment in Censys to $149 million. The post Censys Raises $70 Million for Internet Intelligence ...
IBM's Mark Hughes and Fabio Campos discuss how organizations are rethinking cyber risk through automation, real-time data, and AI-driven insights.
Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. The post The Next Cybersecurity Crisis Isn’t B...
Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds
Codenotary launched AgentMon, an enterprise-grade monitoring designed specifically for agentic networks, providing organizations with real-time visibility in...
DoControl announced new capabilities that provide visibility, monitoring, and automated control for Google Gemini Gems, a newly introduced feature within Goo...
Think of AI browsers as a new category of enterprise software, not an advanced version of a traditional browser.
When asked about the factors that affect business operations beyond IT teams, 74% of companies that decided to slow or delay application deployments over the...
Foxit Software introduced a new capability designed to uncover hidden security risks inside PDFs as part of its latest PDF Editor 2026.1 release for Windows ...
With critical services, institutional data, and user identities now spanning countless cloud and SaaS platforms, the conventional campus perimeter has disapp...
Researchers found that while 99% of respondents cite AI as one of the factors contributing to a rising demand for cloud investment, 88% reported existing bud...
AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize ...