Quantum Safe News Center

Your sources for the latest in quantum safe technologies, zero trust architecture and next-gen cybersecurity for distributed workforces.

Understanding Akira Ransomware: Attack Trends and Defense Strategies

Unmask the Akira ransomware. Learn its attack vectors, execution methods, and defense strategies to protect your organization. Read more now!

By Alan V Gutnov 4 min read
common.read_full_article

Critical Fortinet FortiWeb Vulnerability Exploited in the Wild

Critical Fortinet FortiWeb vulnerability (CVE-2025-64446) is actively exploited. Learn about the exploit, affected versions, and how to patch now!

By Divyansh Ingle 3 min read
common.read_full_article

Managing Non-Human Identities: A New Frontier in Cybersecurity

Discover the growing risks of non-human identities (NHIs) like bots and AI agents in cybersecurity. Learn how to gain visibility, enforce 'just enough' access, and protect your enterprise. Read more!

By Alan V Gutnov 3 min read
common.read_full_article

APT Group Exploits Cisco and Citrix Zero-Days for Webshells

Discover how sophisticated attackers exploit Cisco ISE & Citrix zero-days to deploy webshells. Learn critical security implications & defense strategies. Protect your network now!

By Jim Gagnard 4 min read
common.read_full_article

CISA Warns: Patch Samsung 0-Day RCE Flaw to Prevent Attacks

CISA warns of critical zero-day vulnerability in Samsung devices (CVE-2025-21042). Learn how it's exploited and how to protect your data. Patch now!

By Edward Zhou 2 min read
common.read_full_article

Critical runC Vulnerabilities Allow Container Escape in Docker, Kubernetes

Urgent! Three severe runC flaws allow container escape in Docker & Kubernetes. Update now to protect your systems from root access. Learn more!

By Alan V Gutnov 4 min read
common.read_full_article

AIVSS: Bridging AI Security Gaps for Safer Applications

Discover the OWASP AI Vulnerability Scoring System (AIVSS) for assessing AI security risks. Learn about its framework, deliverables, and how it closes the gap with CVSS. Explore the AIVSS calculator and join the project!

By Alan V Gutnov 5 min read
common.read_full_article

Criminals Profit from Growing Market for Illicit AI Tools

Criminals are leveraging AI to create sophisticated malware and automate attacks. Discover the latest AI threats and how they're evolving. Learn more!

By Alan V Gutnov 2 min read
common.read_full_article

Google Discovers PROMPTFLUX Malware Leveraging AI for Evasion

Discover how threat actors are weaponizing AI & LLMs like Gemini for sophisticated malware evasion and attacks. Learn about PromptFlux, QuietVault & more. Stay protected!

By Edward Zhou 3 min read
common.read_full_article