Court charges dev with hacking after cybersecurity issue disclosure
A German court has charged a programmer investigating an IT problem with hacking and fined them €3,000 ($3,265) for what it deemed was unauthorized access…
A German court has charged a programmer investigating an IT problem with hacking and fined them €3,000 ($3,265) for what it deemed was unauthorized access…
Brave Software has announced plans to deprecate the ‘Strict’ fingerprinting protection mode in its privacy-focused Brave Browser because it causes many sites to function incorrectly.…
A widespread Facebook phishing campaign stating, “I can’t believe he is gone. I’m gonna miss him so much,” leads unsuspecting users to a website that…
We are now at the age of advanced AI assistants. This unique software significantly simplifies our everyday tasks, providing us with time to focus on…
The NSW government is testing the ability of an artificial intelligence model to predict risks to children and young people in out-of-home care. The Department…
LockBit ransomware gang claims the attack on the sandwich chain Subway Pierluigi Paganini January 21, 2024 The LockBit ransomware gang claimed to have hacked Subway,…
Finnish IT services and enterprise cloud hosting provider Tietoevry has suffered a ransomware attack impacting cloud hosting customers in one of its data centers in…
Qantas is making use of the open source Polylith software architecture and tooling to make it simpler and less resource-intensive to make changes to websites…
By Anastasios Arampatzis, Cybersecurity Content Creator at Bora In today’s digital age, APIs have become the backbone of software communication. They are the unsung heroes…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Key elements for a successful cyber risk management strategyIn this…
In today’s complex digital landscape, the security of APIs has become paramount. As we move into 2024, it’s essential to stay ahead of the evolving…
A new Outlook vulnerability that can be used to extract NTLMv2 hashes by exploiting Outlook, Windows Performance Analyzer (WPA), and Windows File Explorer has been…