Ping-Keyless deal highlights authentication gaps for frontline workersLaura FrenchNovember 14, 2025Shared terminals and lack of phone access pose challenges for both passwords and passwordless authentication.
More than just a password: Cybersecurity lessons from the Louvre heistGerald BeucheltNovember 14, 2025
Most CISOs now own AI security: Here’s what that means for your businessBlake EntrekinNovember 12, 2025
OWASP Global AppSec conference: How to make AI work for you instead of taking your jobPaul WagenseilNovember 6, 2025
How to accelerate onboarding and achieve full app coverage in your IGA programPaul WagenseilNovember 4, 2025
Building the next generation of cyber leaders: Inside the new InfraGard National Members Alliance–CyberRisk Collaborative partnershipBill BrennerNovember 4, 2025
RansomwareAkira group has defrauded $244 million in ransomware payments, says FBISteve ZurierNovember 14, 2025Figure puts Akira behind the Clop group, which has reportedly extorted more than $500 million.
Vulnerability ManagementCisco ASA firewalls still under attack; CISA issues guidance for patchSteve ZurierNovember 14, 2025Feds say multiple organizations observed not patching to the minimum software version.
RansomwareEuropol takes down more than 1,000 malicious servers in Operation EndgameSteve ZurierNovember 13, 2025Joint law enforcement team targeted three malware strains at the heart of ransomware worldwide.
RansomwareGoogle lawsuit takes aim at group behind text message scamsLaura FrenchNovember 13, 2025Google filed a lawsuit against individuals behind the Lighthouse SMS phishing kit.
IdentityPing’s purchase of Keyless signals expansion of identity capabilitiesSteve ZurierNovember 12, 2025Ping is addressing emerging threats with purchase of biometrics authentication company.
IdentityMalicious npm package uses typosquatting to infect legitimate GitHub repoSteve ZurierNovember 12, 2025Typosquatting attack underscores how fragile the software supply chain has become in the open-source era.
IdentityYubico teams with HYPR and Nametag to integrate identity verification into passkey deploymentsBill BrennerNovember 12, 2025The move is designed to tie verified identities to hardware-based passkeys from the point of onboarding.
Vulnerability ManagementSAP removes SQL Anywhere Monitor due to max severity security flawLaura FrenchNovember 12, 2025SAP disclosed 18 new vulnerabilities, including two critical flaws and one high severity bug.