Cyberattack Disrupts European Airports, Security Leaders Respond Jordyn Alger September 23, 2025 A cyberattack disrupted operations in European airports. Cyber experts are sharing their insights. Read More
Time to Embrace Offensive Security for True Resilience Greg Neville September 18, 2025 Cybercriminals are using artificial intelligence to quickly discover network vulnerabilities, create polymorphic malware, and improve advanced persistent threats. Read More
Global News & Analysis Q1 2025 Saw a 171% Increase in Total Unique Malware Detections Taelor Sutherland September 9, 2025 Q1 2025 saw nearly a 200% increase in malware detections.Read More
Ransomware Attack Targets PA Attorney General’s Office Security Staff September 4, 2025 The Pennsylvania Office of Attorney General was the victim of a ransomware attack. Read More
Cyberattack on Jaguar Land Rover Disrupts Business Operations Jordyn Alger September 4, 2025 Jaguar Land Rover experienced a cyber incident that has impacted business operations. Read More
Russia-Sponsored Cyberattack Campaign Targets Networking Devices, Critical Infrastructure Jordyn Alger August 22, 2025 A Russia-sponsored campaign is targeting end-of-life devices via a seven-year-old vulnerability. Read More
Global News & Analysis Bad Bots Made Up 31% of Holiday 2024 Traffic Taelor Sutherland August 13, 2025 Nearly a third of holiday traffic was made up of bots.Read More
Traffic to GenAI Websites Increases by 50%, and Cyberattacks Grow With It Jordyn Alger August 12, 2025 Researchers have discovered an increase in traffic to generative AI websites. Read More
How Should CISOs Prepare for AI Threats, Cyberattacks or Emergencies? Listen to Aimee Cardwell, CISO in Residence for Transcend, in this podcast episode. Security Staff July 30, 2025 Aimee Cardwell, CISO in Residence for Transcend, shares how CISOs should prepare for AI threats, cyberattacks and emergencies.Read More
Global News & Analysis Researchers Found Nearly 600 Incidents of AI Fraud Taelor Sutherland July 23, 2025 Managing browser-based vulnerabilities.Read More