How Countries Can Collaborate To Combat Cybercrime
19 Aug How Countries Can Collaborate To Combat Cybercrime Posted at 08:42h in Blogs by Taylor Fox This week in cybersecurity from the editors at…
19 Aug How Countries Can Collaborate To Combat Cybercrime Posted at 08:42h in Blogs by Taylor Fox This week in cybersecurity from the editors at…
After two decades of developing increasingly mature security architectures, organizations are running up against a hard truth: tools and technologies alone are not enough to…
US President Donald Trump will this week give TikTok a fresh 90-day extension to find a non-Chinese buyer, the White House said on Tuesday, the…
A sophisticated exploit targeting critical SAP vulnerabilities has been publicly released by the notorious hacking group ShinyHunters, significantly escalating the threat landscape for enterprise SAP…
The UK’s South Yorkshire Police lost 96,000 bodycam videos in a data transfer mishap, impacting 126 cases. Poor backups and IT failures led to the…
Aug 19, 2025Ravie LakshmananEncryption / Cloud Security The U.K. government has apparently abandoned its plans to force Apple to weaken encryption protections and include a…
TPG Telecom confirms that a cyber incident affecting its iiNet subsidiary exposed the personal data of approximately 280,000 customers, marking one of the most significant…
US President Donald Trump on Thursday signed an executive order to keep TikTok running in the US for another 90 days to give his administration…
The Trellix Advanced Research Center exposed a DPRK-linked espionage operation attributed to the Kimsuky group (APT43), targeting diplomatic missions in South Korea. Between March and…
Pure Storage’s recent launch of its Enterprise Data Cloud reignited debate around storage and data management. Pure claims its EDC addresses the management of growing…
Hong Kong police have arrested 118 people in a citywide crackdown on online shopping scams involving losses of more than HK$5 million (US$636,940), largely linked…
Microsoft has unveiled a new AI-powered security capability that addresses one of cybersecurity’s most persistent vulnerabilities: plaintext credentials stored in Active Directory systems. The enhanced…