Category: DarkReading
Well, have you ever heard the saying, “everyone’s a somebody to someone”? That’s especially true when it comes to identity…
How important is choosing the words in a cyber incident response communication plan? Take the case of Capita. The…
The pro-Russian hacker group NoName057(16) seems to be after the UK railway. In the latest few posts, the group has…
By Jake Ooi, Head of Product, SHIELD And it’s only getting bigger. Earlier this year, Meta pursued legal action against…
Mozilla Foundation has released a security advisory detailing a high-impact vulnerability fixed in the latest version of their email client,…
In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year…
A blame game seems to have started, after an ongoing supply chain attack that utilizes a trojanized version of the…
It’s the World Data Backup Day. We have completely swapped the physical storage of documents with soft copies to store…
Security researchers detected a new attack vector in Azure Active Directory (AAD) that allowed them to alter the search results…
UK on AI: The UK government today published a white paper outlining a “pro-innovation approach” to regulating artificial intelligence (AI),…
A spyware vendor was found exploiting zero-day and N-day vulnerabilities against popular platforms, reported Google’s Threat Analysis Group (TAG). As…
Prince Harry Phone Hacking: Prince Harry has recently made a startling accusation against the royal family, claiming that they deliberately…