CISA Launched A Free Guide to Enhance OT Products Security
To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new step-by-step guide designed to help…
To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new step-by-step guide designed to help…
The UK’s National Cyber Security Centre (NCSC) has joined forces with its Five Eyes partners and other agencies from the European Union (EU) to publish…
Nominet, the official .UK domain registry and one of the largest country code registries, has confirmed that its network was breached two weeks ago using…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has launched a new guidance document to enhance cybersecurity for operational technology (OT) products. The guide, titled…
This week on the Lock and Code podcast… The era of artificial intelligence everything is here, and with it, come everyday surprises into exactly where…
Freedom. It’s the word that sparked a revolution of technological innovation, a promise embedded in every breakthrough, especially artificial intelligence (AI). AI was praised as…
A new ransomware campaign encrypts Amazon S3 buckets using AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms…
Amazon Storage Buckets Targeted by Codefinger Ransomware Amazon Web Services (AWS), often considered one of the most secure cloud storage platforms, is now facing a…
The Labour government’s 50-step artificial intelligence (AI) plan sets out a series of measures to develop the UK as a powerhouse for artificial intelligence. Some…
Becoming successful in this digital age means your business operations, decision-making, and customer relationships are primarily powered by your data. Unfortunately, the quality of your…
A smishing (SMS phishing) campaign is targeting iMessage users, attempting to socially engineer them into bypassing Apple’s built in phishing protection. For months, iMessage users…
Jan 13, 2025Ravie LakshmananVulnerability / Cloud Security A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation…