On 21 October 2025, we celebrate the fifth Encryption Day. As part of the Global Encryption Coalition, APC is highlighting ...
Using any password manager is better than using none, so if you’re avoiding your browser’s password manager because you’ve ...
Explore the fascinating world of encryption in this video, where we delve into how it works and its significance in securing information. Prince Andrew gives up royal titles, including Duke of York ...
"Hotline: Cybersecurity and Privacy" tackles the philosophical, moral, strategic, and organizational quandaries related to ...
Russia-linked threat group Coldriver rapidly replaced its exposed malware with a stealthier PowerShell variant, using fake ...
Researchers caution that the group’s rapid pivots and targeted filtering complicate detection and require behavior-based ...
Iran-linked MuddyWater used a compromised email to spread Phoenix malware targeting 100+ MENA government entities ...
The Coldriver hacking group reportedly shifted its operation quickly after the May 2025 public disclosure of its LostKeys ...
North Korean threat group Famous Chollima is using blockchain technology to hide malware payloads in smart contracts, which marks the first documented case of a nation-state actor adopting ...
Explore how BTE could help rollups such as Metis and Espresso build fair, private markets with MEV prevention mechanisms.
Digital technology, which should help to concentrate and centralize information to prevent losses, offers no guarantee ...