Persistent data breaches deny people with HIV dignity, privacy
Charities and healthcare organisations working with HIV positive people are persistently failing to take account of their basic data protection and privacy needs, with frequent…
Charities and healthcare organisations working with HIV positive people are persistently failing to take account of their basic data protection and privacy needs, with frequent…
CISA guidelines to protect critical infrastructure against AI-based threats Pierluigi Paganini April 30, 2024 The US government’s cybersecurity agency CISA published a series of guidelines…
Three large-scale campaigns targeted Docker Hub users, planting millions of repositories that pushed malware and phishing sites since early 2021. As JFrog security researchers found, around…
The disruption to GPS services started getting worse on Christmas day. Planes and ships moving around southern Sweden and Poland lost connectivity last December 25…
Cloud-based zero-trust and zero-knowledge software specialist Keeper Security has joined storied Formula 1 team Williams Racing as an official partner ahead of the Miami Grand…
A new Android backdoor malware named ‘Wpeeper’ has been spotted in at least two unofficial app stores mimicking the Uptodown App Store, a popular third-party…
Barnsley Council has deployed Copilot for Microsoft 365 at scale to integrate across the systems council workers use every day, including PowerPoint and Teams. Staff…
In today’s digital landscape, the threat of ransomware attacks looms over businesses of all sizes and industries. The emergence of AI-powered cyber-crime has only exacerbated…
Foreign ministers from states around the world are calling for multilateral action to safeguard humanity against the growing threat of autonomous weapon systems (AWS), which…
As we have in previous editions of the ThreatStats report, we highlight the industry’s top API-related attacks and trends. New to this version, however, is…
Vulnerability exploits are the third most common way that cybercriminals gain access to target organizations, surpassed only by credential stealing and phishing in 2023. Once…
Trends to Look Out for in 2024 By Yashin Manraj, CEO, Pvotal Technologies For cybersecurity professionals, remaining effective requires staying on top of a constantly…