Can America’s Cyber Czar Shrink The Skills Gap?
In Apr. 2019, Kristi Noem, Governor of South Dakota at the time, and now U.S. Secretary of Homeland Security (DHS), wrote that “the cost of…
In Apr. 2019, Kristi Noem, Governor of South Dakota at the time, and now U.S. Secretary of Homeland Security (DHS), wrote that “the cost of…
Human rights group Liberty has said the UK government’s proposed Crime and Policing Bill will transform the country’s driving licence database into a de-facto facial…
What if the smart thermostat in your home decides that winter is the perfect time for you to experience tropical heat or your self-driving car…
In a significant development in the cybersecurity landscape, APT-C-36, more commonly known as Blind Eagle, has intensified its operations targeting Colombian governmental, financial, and critical…
Have you ever wondered who’s keeping tabs on all that personal data we hand out online? You know, those pesky “Accept Cookies” pop-ups or the…
Mar 13, 2025Ravie LakshmananAuthentication / Vulnerability Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass…
The government has canned the Payments Services Regulator (PSR) to reduce red tape as part of its Plan for Change. PSR activities will be transitioned…
In today’s complex cybersecurity landscape, organizations face an evolving array of threats that target the intersection of physical and digital domains. One technology gaining significant…
Microsoft has released a critical patch for a 2-year-old Windows kernel security vulnerability. This vulnerability, identified as CVE-2025-24983, allows attackers to exploit a weakness in…
Cybersecurity researchers have recently identified a cluster of JSPSpy web shell servers featuring an unexpected addition, Filebroser, a rebranded version of the open-source File Browser…
Zoom has released important security patches addressing several vulnerabilities that affect its applications, including four high-severity flaws. These Zoom vulnerabilities was discovered by the company’s…
Large-scale operations and the extensive attack surface of the retail industry render it particularly susceptible to cybercrime, on a global scale. Websites, mobile apps, and…