Cybersecurity classics: 10 books that shaped the industry
Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a…
Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a…
The United States has taken significant steps to address the growing threat of Chinese cyber intrusions into U.S. government agencies and critical infrastructure. On March…
Medibank is looking to generative AI as a support mechanism that could help turn the idea of a four-day work week into reality. Martech platforms…
China-linked APT UNC3886 targets EoL Juniper routers Pierluigi Paganini March 12, 2025 Mandiant researchers warn that China-linked actors are deploying custom backdoors on Juniper Networks Junos…
Cybersecurity firm Dragos has revealed a prolonged cyber attack by the Chinese threat actor Volt Typhoon into the United States electric grid, specifically targeting the…
Lazarus Group has burrowed deeper into the npm registry and planted six new malicious packages designed to deceive software developers and disrupt their workflows, researchers…
Spain’s government has approved a bill imposing massive fines on companies that use content generated by artificial intelligence (AI) without properly labelling it as such,…
Two members of the Senate Judiciary Committee are preparing to introduce a bipartisan bill that would mandate tech companies to more swiftly report and remove…
A NASA telescope was launched into space from California for a mission to explore the origins of the universe and to scour the Milky Way…
Facebook is warning that a FreeType vulnerability in all versions up to 2.13 can lead to arbitrary code execution, with reports that the flaw has…
Uniting has launched a generative AI-powered digital assistant to provide its staff with information and support tools at the “point of care”. The digital assistant…
Chinese hackers are deploying custom backdoors on Juniper Networks Junos OS MX routers that have reached end-of-life (EoL) and no longer receive security updates. The backdoors…