Chat control: Tech companies warn ministers over EU encryption plans
EU tech companies have written to ministers across the European Union (EU) urging them not to support a proposed regulation on child sexual abuse that…
EU tech companies have written to ministers across the European Union (EU) urging them not to support a proposed regulation on child sexual abuse that…
Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web Pierluigi Paganini January 22, 2024 Resecurity researchers warn of massive leak of…
Monobank, Ukraine’s largest mobile-only bank, faced a barrage of denial of service (DDoS) attacks on January 21, crippling its operations and causing widespread disruption. Co-founder…
In a case that ignites the age-old debate between security concerns and ethical hacking, a German court has convicted a programmer who uncovered a critical…
Microsoft revealed on Friday that its corporate email servers were breached by the hacking group Midnight Blizzard, which is believed to be funded by the…
CloudFoxable is a capture-the-flag (CTF) style learning platform you can deploy to your playground AWS account. It primarily targets current penetration testers seeking to learn…
Jan 22, 2024NewsroomPrivacy / Technology The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting InMarket Media from selling…
In a recent update on the notorious LockBit ransomware group’s dark web portal, the threat actor proudly announced the addition of three new victims to…
Finnish IT services and enterprise cloud hosting provider Tietoevry has fallen victim to a ransomware attack, impacting cloud hosting customers in one of its data…
Backdoored pirated applications targets Apple macOS users Pierluigi Paganini January 22, 2024 Researchers warned that pirated applications have been employed to deliver a backdoor to…
Network Security protocols are designed to safeguard computer networks from unauthorized access, data breaches, and other cyber threats. And here are some common types of…
The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material…