CMA consults on Google’s search dominance
Under the Digital Markets Competition Regime, the Competition and Markets Authority (CMA) has proposed to designate Google with “strategic market status” (SMS). Google Search accounts…
Under the Digital Markets Competition Regime, the Competition and Markets Authority (CMA) has proposed to designate Google with “strategic market status” (SMS). Google Search accounts…
The Open Web Application Security Project (OWASP) has announced the development of a comprehensive OWASP AI Testing Guide, marking a significant milestone in addressing the…
Security researchers at SecurityScorecard have uncovered a sprawling cyber-espionage campaign orchestrated by the LapDogs Operational Relay Box (ORB) Network, a sophisticated infrastructure compromising over 1,000…
Jun 24, 2025Ravie LakshmananData Protection / Mobile Security The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices,…
U.S. warns of incoming cyber threats following Iran airstrikes Pierluigi Paganini June 24, 2025 U.S. warns of cyberattacks by pro-Iranian groups after launching airstrikes on…
The Wordfence Threat Intelligence Team uncovered a sophisticated malware campaign during a routine site cleanup, revealing a family of malicious code targeting WordPress and WooCommerce…
The Common Good Cyber Fund is a new effort to support cybersecurity that protects everyone, especially those most at risk of harassment, harm, or coercion.…
Thank you for joining! Access your Pro+ Content below. 24 June 2025 Digital ID: cool or contentious? Share this item with your network: In this…
China-linked APT Salt Typhoon targets Canadian Telecom companies Pierluigi Paganini June 24, 2025 Canada and FBI warn of China-linked APT Salt Typhoon targeting Canadian telecom…
Organizations are adopting bug bounty programs more and more as part of a layered security strategy to address the skills gap and to help their…
Summary 1. A high-severity flaw (CVE-2025-6218) in WinRAR allows attackers to execute arbitrary code by exploiting how the software handles file paths within archives. 2.…
As artificial intelligence (AI) becomes a cornerstone of modern industry, the Open Web Application Security Project (OWASP) has announced the release of its AI Testing…