AI generated scams and phishing in 2026
Monday, January 5, 2026 by Austin Harris
David Stonehill, CTO, NetLib Security offers his insight into what 2026 will hold for us in the way of AI scams.
By 2026, AI-generated scams and phishing will be virtually indistinguishable from legitimate apps, storefronts, and communications making detection alone unreliable. App developers will need to design for breach resilience using MFA, passkeys, AI-driven se...
Safe c plus plus proposal abandoned after community pushback
Tuesday, November 25, 2025 by Russ Scritchfield
In the ever-evolving landscape of software development, a significant effort to overhaul the C++ programming language for enhanced safety has come to an abrupt halt. The Safe C++ proposal, which sought to introduce a memory-safe subset of the language inspired by the guarantees found in newer languages like Rust, has been abandoned by its lead author. This development o...
Airline data breach hits WestJet exposing over 1M passengers
Thursday, October 30, 2025 by Russ Scritchfield
Canada’s second-largest airline, WestJet, disclosed that a data breach earlier this year compromised the personal information of approximately 1.2 million passengers. The airline reported the incident in a filing with Maine’s attorney general, confirming that 240 residents in the state were affected.
Details of the information compromised
The informati...
Russian airport hacked as St. Petersburg website reports cyberattack
Monday, October 6, 2025 by Trey Abbe
Pulkovo airport, the primary international gateway for St. Petersburg, reported that its official website had been compromised in a cyberattack. The airport serves millions of passengers annually, making secure digital operations essential for timely flight information and passenger services. Officials confirmed that the attack temporarily disrupted access to the websit...
Push for FTC to Investigate Microsoft
Monday, September 22, 2025 by Austin Harris
U.S. Senator Ron Wyden has formally requested the Federal Trade Commission to examine Microsoft for what he describes as significant cybersecurity shortcomings. The request cites repeated security incidents and raises questions about the company’s role in safeguarding critical infrastructure.
Senator highlights cybersecurity risks
In a letter addressed to FT...
Salesforce data breach linked to Tenable via Salesloft Drift
Friday, September 12, 2025 by Richard Harris
A recent Salesforce data breach involving the Salesloft Drift integration has affected multiple organizations, including cybersecurity company Tenable. The company confirmed that limited customer contact and support case data were exposed but emphasized that no core product data was compromised.
Scope of exposed information
Tenable reported that information access...
Hackers steal cryptocurrency using fake job offers report reveals
Tuesday, September 9, 2025 by Trey Abbe
A recent investigation reveals that North Korean hacking groups are using elaborate fake job offers to steal cryptocurrency from blockchain professionals and investors. The scams, identified in a joint report by cybersecurity firms SentinelOne and Validin, include posing as recruiters for major crypto companies and directing applicants to download malicious software or ...
Salesforce breach let hackers steal Google customer data
Monday, August 25, 2025 by Richard Harris
In June, one of Google’s corporate Salesforce instances was affected by activity consistent with the UNC6040 campaign described in the post. Google responded by conducting an impact analysis and implementing mitigation steps. The affected instance stored contact information and related notes for small and medium-sized businesses. Investigators confirmed that data ...
KNP ransomware attack
Wednesday, August 6, 2025 by Russ Scritchfield
One of the UK's oldest transport companies, KNP Logistics Group, collapsed under the weight of a ransomware attack that began with a single guessed password. The company, founded in 1865 and known primarily through its “Knights of Old” fleet, had survived world wars, economic upheavals, and generational shifts in the freight industry. But it could not su...
CoinDCX launches bounty after security breach
Friday, August 1, 2025 by Richard Harris
CoinDCX, one of the largest cryptocurrency exchanges in India, has issued an official statement following a sophisticated security incident on July 19, 2025, which affected one of its internal operational accounts used solely for liquidity provisioning on a partner exchange. The company emphasized that no customer funds were impacted and that all assets remain secure in...
Jack Dorsey unveils Sun Day
Tuesday, July 22, 2025 by Austin Harris
Jack Dorsey, known globally as the co-founder of Twitter and CEO of Block, has been on a creative tear lately, launching back-to-back experimental apps. The latest addition to his portfolio is Sun Day, a simple yet intriguing app aimed at helping users track their sun exposure, monitor UV levels, and estimate vitamin D synthesis, all from their smartphones.
Available...
DataKrypto launches new AI models
Friday, May 9, 2025 by Richard Harris
DataKrypto launched a new solution that protects AI models and the data of businesses using them. Based on the company’s patented FHE technology, the solution, FHEnom for AI, addresses a critical security gap and delivers unprecedented AI protection.
FHEnom for AI is a zero-knowledge framework that safeguards both customized open-source AI models (adapted for s...
NetLib Security predictions 2025
Thursday, January 2, 2025 by Richard Harris
The leading prediction for 2025 will sound familiar: Generative AI directly affects your privacy rights. In many ways, this is a twist on the typical cybersecurity problem. Rather than a hacker or a bad actor breaking in to steal your data, we are being asked to hand our keys to the companies we often trust the most: Microsoft, Apple, Dropbox, and Google!
NetLib Secu...
DevOps threats report released from GitProtect io
Monday, August 12, 2024 by Brittany Hainzinger
Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities,
and, as a result, data loss are the reality that DevSecOps teams have to face...even every
few days.
The State of DevOps threats report - teams affected every few days
GitProtect.io recently presented its studies on the most severe incidents affecting tools like GitHub...
AI changing how developers code and how companies hire developers
Monday, May 8, 2023 by Austin Harris
HackerRank released a new report on the state of AI-related coding skills and found that the nature of a developer's work is quickly evolving to keep up with advancements in Artificial Intelligence. As a result, how companies find, hire, and upskill developers must also change to match this emerging reality.
HackerRank surveyed more than 42,000 global developers ...
Developers and brands must make mobile apps far more secure
Tuesday, January 17, 2023 by Austin Harris
The bad guys are still breaking digital windows and kicking down digital doors, so to speak, and will continue well into 2023 and beyond!
Consumers through experience or gut instinct will demand that their mobile app providers deliver key security features including trying to stop the increasingly prevalent "man-in-the-middle" attacks. The latest techn...
Apex Legends Mobile Hyperbeat event
Tuesday, August 23, 2022 by Austin Harris
EA and Respawn Entertainment are pleased to announce a brand new event for Apex Legends Mobile. The Hyperbeat event launched with lots of hot new features to explore. In addition to the arrival of Legend Crypto, the Hyperbeat event also included a brand new ranked split, new events, a new Battle Pass, and updates to core systems.
Hyperbeat event updates
Fans ...
Promon partners with F5 to simplify mobile SDK integration
Wednesday, October 27, 2021 by Austin Harris
Promon, the Oslo-based app security company announced its partnership with F5, the multi-cloud application security and delivery company. This partnership now enables F5's customers to seamlessly implement the F5 Bot Defense Mobile SDK. The solution provides developers with the necessary tools to protect their applications from bot attacks utilizing Promon'...
Advanced digital fingerprinting capabilities from SEON
Monday, October 25, 2021 by Austin Harris
SEON, the fraud fighters, have unveiled modern digital device fingerprinting capabilities designed to identify and counter the latest internet and mobile fraud tactics used by sophisticated fraudsters and bots.
Advanced digital fingerprinting capabilities
Fraudsters increasingly use unusual device setups to speed their efforts. Device fingerprinting can ...
Protecting source code
Wednesday, October 6, 2021 by Nigel Thorpe
Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...
SnykCon 2021 event lineup
Friday, September 24, 2021 by Randall Degges
We're only a few weeks away from SnykCon 2021, Snyk's free annual developer conference that helps you learn how to build applications securely running October 5-7. We have a packed agenda full of expert talks, hands-on workshops, helpful demos, product roadmaps, opportunities to interact with some of the smartest speakers and leaders of developer security i...
Tech hiring surges in 2021
Wednesday, August 25, 2021 by Brittany Hainzinger
Tech job postings increased 16% in the second quarter of 2021, with locations, occupations, skills, and employers across the country experiencing strong quarter-over-quarter growth, according to the Q2 2021 Tech Job Report from Dice, a DHI Group, Inc. brand (NYSE: DHX).
Nationwide tech hiring surges in the second quarter of 2021
...
Network visibility improves with Endace and Kemp Technologies
Tuesday, August 24, 2021 by Brittany Hainzinger
Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy.
Network visibility improves, helping teams reduce incident response times
The enhanced network flow metadata generation and intelligent traffic mon...
Faster customer integrations from HackerOne
Thursday, July 29, 2021 by Austin Harris
Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...
Not all security vulnerabilities are created equal
Tuesday, May 25, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function, value and, unfortunately, they also provide one of the easiest openings for cybercriminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the concept o...
Six areas of focus for continuous security
Friday, April 16, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...
Denuvo has joined the PlayStation 5 Tools and Middleware program
Wednesday, March 10, 2021 by Brittany Hainzinger
As security and innovation collide, Denuvo by Irdeto announces it has joined the exclusive PlayStation®5 Tools and Middleware program. Denuvo offers its Anti-Cheat solution through this program to publishers and developers whose games are available on PlayStation®5.
Denuvo is at the forefront of games security with over 2 billion unique game installs pro...
DevSecOps will go mainstream this year
Tuesday, January 26, 2021 by Richard Harris
Cybercriminals love Shadow Code exploits because hacking a commonly used library or service can place the malicious code on hundreds or thousands of websites. For example, the widely used jQuery JavaScript library has been breached multiple times, leading to digital skimming attacks broadly across the e-commerce sector. Adding jQuery to an application without ...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
HackNotice announces threat intelligence platform
Friday, September 18, 2020 by Brittany Hainzinger
HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...
Datagran launches no-code platform
Tuesday, July 14, 2020 by Brittany Hainzinger
Datagran introduced its flagship platform. Designed to empower developers and growth hackers within data intensive companies, the Datagran platform allows companies to accelerate time-to-market for existing and new products and reduce the total number of tools needed to meet their business goals - without the need to write code and build APIs.
Many companies today ar...
Epic Games partners with Fortumo to launch carrier billing
Tuesday, June 9, 2020 by Brittany Hainzinger
The video game and software developer and publisher Epic Games and the mobile technology company Fortumo are announcing the launch of a carrier billing partnership. Epic Games has integrated Fortumo’s carrier billing platform to collect payments for Fortnite Battle Passes, game purchases in the Epic Games Store and other Epic Games content.
The first country wh...
Postal.io redefines offline B2B marketing
Tuesday, May 5, 2020 by Brittany Hainzinger
Offline sales and marketing engagement is being redefined by Postal.io, particularly in today’s era of social distancing and remote work brought about by the global coronavirus pandemic. Ushering in a new era of capability and control, Postal’s sales and marketing automation platform enables enterprise B2B companies to effectively manage offline marketing pr...
Developer survey report from HackerEarth
Monday, May 4, 2020 by Brittany Hainzinger
HackerEarth released its first-ever developer survey report titled “Behind the Code: HackerEarth Developer Survey 2020.” The report gives employers and recruiters a look into the minds and motivations of today’s most hard-to-recruit and highly coveted talent and provides developers with insights on upskilling and career development.
The survey resul...
One Identity Safeguard now supports Microsoft SQL Server
Friday, May 1, 2020 by Brittany Hainzinger
One Identity announced that its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments. Microsoft was positioned as a Leader in the 2019 Gartner Magic Quadrant for Operational Database Management Systems*. With One Identity Safeguard, organizations can for the first time securely manage, monitor, record and audit...