Shadow AI is the latest cybersecurity threat you need to prepare for
Shadow IT – the use of software, hardware, systems and services that haven’t been approved by an organization’s IT/IT Sec departments – has been a…
Shadow IT – the use of software, hardware, systems and services that haven’t been approved by an organization’s IT/IT Sec departments – has been a…
The Cybersecurity and Infrastructure Security Agency (CISA) has recently released an essential advisory on Industrial Control Systems (ICS). The CISA One Industrial Control Systems Advisory, marked…
Polycab India Limited, a leading manufacturer of wires and cables, has reported a significant ransomware attack on its IT infrastructure. The company has disclosed the…
A group of cybersecurity researchers has uncovered several critical security flaws in the Saflok electronic RFID locks by Dormakaba. These locks, widely used in hotels…
Russia implemented a sweeping ban on Microsoft Cloud services on March 20th, with plans to extend the prohibition to Google and Amazon web services in…
Financially motivated hackers have been leveraging SmokeLoader malware in a series of phishing campaigns predominantly targeting Ukrainian government and administration organizations. The phishing campaign The…
Mar 22, 2024NewsroomPrivacy / Encryption The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple of…
Pwn2Own Vancouver 2024 has ended with security researchers collecting $1,132,500 after demoing 29 zero-days (and some bug collisions). Throughout the event, they targeted software and products…
Despite JavaScript’s widespread use, writing secure code remains challenging, leading to web application vulnerabilities. Experiments on real-world vulnerabilities show LLMs hold promise for automated JavaScript…
QR codes, once a simple tool for scanning and accessing information swiftly, have become a ubiquitous feature in our digital landscape. From restaurant menus to…
The use of hybrid multicloud models is forecasted to double over the next one to three years as IT decision makers are facing new pressures…
Mar 22, 2024NewsroomLinux / Cyber Warfare The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new…