Understanding New SaaS Cybersecurity Rules
The SEC isn’t giving SaaS a free pass. Applicable public companies, known as “registrants,” are now subject to cyber incident disclosure and cybersecurity readiness requirements…
The SEC isn’t giving SaaS a free pass. Applicable public companies, known as “registrants,” are now subject to cyber incident disclosure and cybersecurity readiness requirements…
Microsoft’s earnings for 2024 show significant growth in the company’s cloud offerings, with revenue in its Intelligent Cloud business increasing 20% to $25.9bn. CEO Satya…
In the murky depths of the digital underworld, a tale unfolds: the rise and fall of “King Bob,” a moniker masking 19-year-old Noah Michael Urban,…
Jan 31, 2024NewsroomCyber Crime / Hacking News Cybersecurity researchers are calling attention to the “democratization” of the phishing ecosystem owing to the emergence of Telegram…
Analyst Forrester has urged IT decision-makers to curb their enthusiasm when it comes to artificial intelligence (AI) to avoid being caught out by a shortfall…
Threat actors exploit Ivanti VPN bugs to deploy KrustyLoader Malware Pierluigi Paganini January 31, 2024 Threat actors are exploiting recently disclosed zero-day flaws in Ivanti…
Attackers abuse trustworthy platforms for redirection, which involves the use of legitimate websites to redirect users to harmful URL destinations. In this ever-evolving world of cyber…
Later in January, Google released Chrome 121 to the stable channel, fixing 17 security issues, three of which are rated as having a high impact.…
Jan 31, 2024NewsroomCryptocurrency / Cybersecurity A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection vector to target…
Hard disk drive (HDD) capacities could double in the next few years, with a milestone achieved by Seagate that brings 30TB (terabyte) drives to the…
Nick Graham, Chief Technology Officer at information security software business Hicomply discusses the recent surge in interest around artificial intelligence. He explains why his company…
Millions of Linux systems are at risk due to four critical vulnerabilities found in the GNU C Library (glibc), a fundamental component of most Linux…