Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE
Tel Aviv, Israel, April 23rd, 2025, CyberNewsWire Lattica, an FHE-based platform enabling secure and private use of AI in the cloud, has emerged from stealth…
Tel Aviv, Israel, April 23rd, 2025, CyberNewsWire Lattica, an FHE-based platform enabling secure and private use of AI in the cloud, has emerged from stealth…
As ransomware, social engineering, and AI-driven deception reshape the threat landscape, cyberinsurance brokers are under pressure to deliver more than just policies – they need partners who…
MITRE has released the latest version of its ATT&CK framework, which now also includes a new section (“matrix”) to cover the tactics, techniques and procedures…
Apr 23, 2025Ravie LakshmananSpyware / Mobile Security Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes…
Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could allow attackers to silently drain user funds, without any phishing,…
AOA, DaVita, and Bell Ambulance hit by ransomware in 2025. Over 245K affected as hackers steal patient data, demand ransoms, and disrupt healthcare services. This…
The exploitation of vulnerabilities has seen another year of growth as an initial access vector for breaches, reaching 20%, according to Verizon’s 2025 Data Breach…
Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access…
Mitre’s Common Vulnerabilities and Exposures (CVE) Program – which last week came close to shutting down altogether amid a wide-ranging shakeup of the United States…
A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according to Darktrace’s honeypot data, has revealed a startling level of…
Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a…
In this storage supplier profile, we look at Hitachi Vantara, which is a small part of a very big organisation. Since we last looked at…