US senators ask FTC to investigate car makers’ privacy practices
An ongoing US Senate investigation indicated that connected car makers violate consumer privacy by sharing and selling drivers’ data, including their location, on a vast…
An ongoing US Senate investigation indicated that connected car makers violate consumer privacy by sharing and selling drivers’ data, including their location, on a vast…
On June 23, 2024, the LockBit cybercriminal group that offers ransomware as a service (RaaS) announced that it had infiltrated the systems of the Federal…
This week on the Lock and Code podcast… In the world of business cybersecurity, the powerful technology known as “Security Information and Event Management” is…
The majority of CrowdStrike Falcon sensors affected by a botched rapid response update were back up and running prior to the weekend of 27 and…
According to the Reserve Bank of India (RBI), the average cost of a data breach in India reached $2.18 million last year. The RBI cybersecurity report,…
Acronis Cyber Infrastructure bug actively exploited in the wild Pierluigi Paganini July 29, 2024 Acronis warns of a critical vulnerability in its Acronis Cyber Infrastructure…
HSA provider HealthEquity has determined that a cybersecurity incident disclosed earlier this month has compromised the information of 4,300,000 people. HealthEquity, one of the largest…
SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust…
VPN demand skyrockets in Bangladesh due to internet restrictions. Learn about the global impact of VPNs on internet censorship and privacy as Hackread continues to…
A recent study by ExtraHop reveals that ransomware attacks on the Paris 2024 Olympics are almost unavoidable. Over the past year, the IT infrastructure supporting…
Matt Clifford, tech entrepreneur and chair of Aria, has been hired by Peter Kyle, secretary of state for science, to deliver an AI Opportunities Action…
Adversaries are employing Large Language Models to generate malicious code, delivered via phishing emails, for downloading diverse payloads, including Rhadamanthys, NetSupport, CleanUpLoader, ModiLoader, LokiBot, and…