The case for cybersecurity: Why successful businesses are built on protection
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
20 articles
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals
The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans
You could be getting more than you bargained for when you download that cheat tool promising quick wins
Posted by Elie Bursztein and Marianna Tishchenko, Google Privacy, Safety and Security Team Empowering cyber defenders with AI is critical to tilting the cybe...
Many testers and tools give up the moment a protocol upgrade to WebSocket occurs, or only perform shallow analysis.
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
Ilevia EVE X1/X5 Server 4.7.
Microsoft Windows Server 2025 Hyper-V NT Kernel Integration VSP - Elevation of Privilege
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
Posted by Eric Lynch, Senior Product Manager, Android Security, and Sherif Hanna, Group Product Manager, Google C2PA Core At Made by Google 2025, we announce...
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecur...
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies.
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortag...
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
Executive summary People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, teleco...
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online...
Sometimes people think they've found HTTP request smuggling, when they're actually just observing HTTP keep-alive or pipelining.