Top 10 cloud stories of 2024
It has been a year of real highs and lows for the hyperscale cloud giants, with the big three all reporting far more upbeat financial…
It has been a year of real highs and lows for the hyperscale cloud giants, with the big three all reporting far more upbeat financial…
A critical Remote Code Execution (RCE) vulnerability (CVE-2024-6386), affecting over 1,000,000 active installations of the WordPress Multilingual Plugin (WPML). This flaw, stemming from a Server-Side…
The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences Center El Paso (TTUHSC El Paso), collectively known as the HSCs,…
RunSafe Security has released the RunSafe Security Platform that automates risk identification, exploit prevention, and runtime software monitoring. Now, developers can generate a high-fidelity software…
Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace.…
The hype surrounding artificial intelligence (AI) has showed no signs of slowing down this year, and the impact of enterprises rushing to adopt the technology…
Russia FSB relies on Ukrainian minors for criminal activities disguised as “quest games” Pierluigi Paganini December 17, 2024 Ukraine’s SBU uncovered an FSB espionage campaign…
Dec 17, 2024Ravie LakshmananCyber Espionage / Malware A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in…
Two Belfast journalists were unlawfully placed under surveillance by two UK police forces, which spied on their phone communications and suspected confidential sources, a court…
Securonix Threat Research team has uncovered a sophisticated tax-related phishing campaign that employs Microsoft Common Console Document (MSC) files and advanced obfuscation techniques to deliver…
Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in Go, CoinLurker employs cutting-edge obfuscation…
As we approach the end of 2024, the question of whether IT sustainability remains a priority in boardrooms is more pertinent now than ever. The…