8 steps to secure GenAI integration in financial services
04
Feb
2025

8 steps to secure GenAI integration in financial services

GenAI offers financial services institutions enormous opportunities, particularly in unstructured dataset analysis and management, but may also increase security risks,…

Microsoft SharePoint Connector
04
Feb
2025

Microsoft SharePoint Connector Flaw Could’ve Enabled Credential Theft Across Power Platform

Feb 04, 2025Ravie LakshmananVulnerability / SharePoint Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector…

Google fixed actively exploited kernel zero-day flaw
04
Feb
2025

Google fixed actively exploited kernel zero-day flaw

Google fixed actively exploited kernel zero-day flaw Pierluigi Paganini February 04, 2025 The February 2025 Android security updates addressed 48…

Apple iPhone
04
Feb
2025

First Apple-notarized porn app available to iPhone users in Europe

The first Apple-notarized porn app, “Hot Tub,” is now available to iPhone users in Europe through the alternative app marketplace,…

Hackers Hide Malware in Fake DeepSeek PyPI Packages
04
Feb
2025

Hackers Hide Malware in Fake DeepSeek PyPI Packages

Cybersecurity researchers at the Positive Technologies Expert Security Center (PT ESC) have found a sneaky malware campaign targeting the Python Package…

Nationwide Building Society to train people to think like cyber criminals
04
Feb
2025

Nationwide Building Society to train people to think like cyber criminals

Nationwide Building Society said it wants to add cyber security training to its programme, which has fast-tracked more than 300…

Web Skimmer found on at least 17 websites, including Casio UK
04
Feb
2025

Web Skimmer found on at least 17 websites, including Casio UK

Web Skimmer found on at least 17 websites, including Casio UK Pierluigi Paganini February 03, 2025 A threat actor has…

Your Health Information Was Compromised. Now What? 
04
Feb
2025

Your Health Information Was Compromised. Now What? 

The healthcare industry has become increasingly reliant on technology to enhance patient care, from advanced image-guided surgery to computerized provider…

AWS
04
Feb
2025

Amazon Redshift gets new default settings to prevent data breaches

Amazon has announced key security enhancements for Redshift, a popular data warehousing solution, to help prevent data exposures due to…

Despite Australia's strict social media ban for minors, a YouTube exemption poses risks
03
Feb
2025

Despite Australia’s strict social media ban for minors, a YouTube exemption poses risks – Software

Australia’s government carved out an exemption for YouTube when it passed laws banning social media access for children under 16,…

Android
03
Feb
2025

Google fixes Android kernel zero-day exploited in attacks

The January 2025 Android security updates patch 48 vulnerabilities, including a zero-day kernel vulnerability tagged as exploited in the wild….

Telstra IT exec bound for Bendigo Bank
03
Feb
2025

Telstra IT exec bound for Bendigo Bank – Training & Development

Telstra’s IT and software engineering lead Kieran O’Meara will move into a newly created chief technology officer role at Bendigo…