This month in security with Tony Anscombe – October 2025 edition
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecur...
20 articles
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecur...
Posted by Lyubov Farafonova, Product Manager, Phone by Google; Alberto Pastor Nieto, Sr. Product Manager Google Messages and RCS Spam and Abuse; Vijay Pareek...
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically
Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams
Casdoor 2.95.
One year from now, with the release of Chrome 154 in October 2026, we will change the default settings of Chrome to enable “Always Use Secure Connections”. T...
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.
Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.
Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from ...
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals
The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans
You could be getting more than you bargained for when you download that cheat tool promising quick wins
Posted by Elie Bursztein and Marianna Tishchenko, Google Privacy, Safety and Security Team Empowering cyber defenders with AI is critical to tilting the cybe...
Many testers and tools give up the moment a protocol upgrade to WebSocket occurs, or only perform shallow analysis.
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality