Tony Anscombe
24
Mar
2025

Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? 12 Dec…

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications
24
Mar
2025

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications

A new strain of malware, known as SvcStealer, has emerged as a significant threat in the cybersecurity landscape. This malware…

iProov Workforce MFA mitigates risk of account takeovers
24
Mar
2025

iProov Workforce MFA mitigates risk of account takeovers

iProov launched iProov Workforce MFA. This device-independent, FIDO Alliance-certified, biometric authentication solution helps organizations mitigate the risk of one of…

Oracle plants agentic AI flag in business process automation
24
Mar
2025

Oracle plants agentic AI flag in business process automation

Oracle has put forward its AI Agent Studio for Fusion Applications as a platform for orchestrating artificial intelligence (AI) agents…

Why a CVSS score of 7.5 may be a 10 in your organization
24
Mar
2025

Why a CVSS score of 7.5 may be a 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific…

North Korea Launches Military Research Facility to Strengthen Cyber Warfare Operations
24
Mar
2025

North Korea Launches Military Research Facility to Strengthen Cyber Warfare Operations

North Korea has taken a significant step in enhancing its cyber warfare capabilities by establishing a new research center, known…

FBI warns of malicious free online document converters spreading malware
24
Mar
2025

FBI warns of malicious free online document converters spreading malware

FBI warns of malicious free online document converters spreading malware Pierluigi Paganini March 24, 2025 The FBI warns of a…

How ASPM gives you control over complex architectures
24
Mar
2025

How ASPM gives you control over complex architectures

As organizations embrace more dynamic and complex application architectures—such as microservices, hybrid cloud infrastructures, and rapid CI/CD pipelines—securing these environments…

Despite challenges, the CVE program is a public-private partnership that has shown resilience
24
Mar
2025

Despite challenges, the CVE program is a public-private partnership that has shown resilience

In 1999, Dave Mann and Steve Christey, two researchers from the nonprofit R&D corporation MITRE,  debuted a concept for security…

Hacking a car – or rather, its infotainment system
24
Mar
2025

Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy…

week in security
24
Mar
2025

A week in security (March 17 – March 23)

March 21, 2025 – The release of the JFK assassination records also resulted in the leak of hundreds of Social…

Cloud, colocation or on-premise? Consider all options
24
Mar
2025

Cloud, colocation or on-premise? Consider all options

Every CIO relies on their own or, more likely, someone else’s datacentre capacity, but the nature of that reliance is…