Next-Generation Technologies & Secure Development , Threat Detection , Video EVP Muhi Majzoub Outlines Integration of TDR, Generative AI Across Core Platforms Michael Novinson (MichaelNovinson) • April 18, 2025 Muhi Majzoub, executive vice president of security products, OpenText (Image: OpenText) OpenText will invest in homegrown threat detection and response, integrate security […]
PKWARE Quantum Readiness Assessment secures data from quantum computing threats
PKWARE announced its quantum readiness assessment and encryption capabilities to help organizations protect sensitive data from quantum computing threats. Quantum computing is no longer theoretical—it is becoming a powerful reality with the potential to disrupt current encryption standards. As quantum machines become capable of breaking traditional encryption methods like RSA and ECC, organizations must act now […]
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
Apr 17, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure Mobile Access (SMA) 100 Series gateways to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The high-severity vulnerability, tracked as CVE-2021-20035 (CVSS score: 7.2), relates to a […]
Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks
China stepped up its allegations of U.S. cyberattacks Tuesday, with local law enforcement saying they were investigating three National Security Agency operatives they had placed on a wanted list and a national official condemning the alleged attacks. State media outlet Xinhau advanced the claims in two stories, one detailing a hacking campaign during the Asian […]
Password manager security: Which is the right option for me?
The first guide of our two-part series helps consumers choose the best way to manage their login credentials While we continue to wait for the long-awaited password-less future to arrive, individuals and enterprises are still stuck with the problem of how to manage their countless, proliferating login credentials. Whether they allow browsers to save passwords, […]
5 warning signs that your phone’s been hacked – and how to fight back
Apple / Elyse Betters Picaro / ZDNET Your mobile phone is a treasure trove of personal and confidential information. That’s why it’s a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. […]
Homeland Security Email Tells a US Citizen to ‘Immediately’ Self-Deport
The Trump administration has sought to revoke the parole of some 532,000 Cubans, Haitians, Nicaraguans, and Venezuelans who entered the US under a Biden-era humanitarian parole program. While it moved to subject them to expedited deportation effective April 24, on Thursday a federal judge in Boston said she would issue a protective order blocking that […]
NVD Revamps Operations as Vulnerability Reporting Surges
After a tumultuous year marked by internal turmoil and a mounting vulnerability backlog, the National Vulnerability Database (NVD) team within the US National Institute of Standards and Technology (NIST) has finally stabilized. However, the NVD is now facing a new challenge: a surge in vulnerability reporting that has sent its backlog soaring, threatening to outpace […]
The Cost of Ransomware: Shutdowns & Extortion
Ransomware is no longer in its heyday. Evolving, AI-driven cybersecurity tools and global law enforcement efforts have seen to that. But that doesn’t mean ransomware is no longer a threat. In fact, in some ways, the danger is greater than ever. While ransomware attacks are less common than they used to be, the consequences of […]
Industrial-strength April Patch Tuesday covers 135 CVEs – Sophos News
Microsoft on Tuesday released 135 patches affecting 19 product families. Ten of the addressed issues, all remote code execution issues, are considered by Microsoft to be of Critical severity, and 18 have a CVSS base score of 8.0 or higher. One, an Important-severity elevation of privilege issue touching the Windows Common Log File system driver, […]