IBM disclosed multiple critical vulnerabilities affecting its Security Verify Access Appliance, potentially exposing users to severe security risks. The vulnerabilities…
Recent research uncovered a novel crypto-jacking attack targeting the Python Package Index (PyPI), where malicious actors uploaded a legitimate-seeming cryptocurrency…
Zero trust security takes an “never trust, always verify” approach to access control. Access is only granted once an individual’s…
Dec 02, 2024Ravie LakshmananMobile Security / Financial Fraud Over a dozen malicious Android apps identified on the Google Play Store…
Google Chrome’s upcoming feature uses AI to provide a summary of reviews from independent websites about the store or website…
A high-severity security vulnerability has been recently disclosed by Hewlett Packard Enterprise (HPE) in its IceWall products that could potentially…
Amazon has taken a significant step forward to enhance the security of its cloud environment. The introduction of advanced AI/ML…
A coordinated international operation involving law enforcement agencies from 40 countries led to the arrest of over 5,500 individuals linked…
This week on the Lock and Code podcast… Two weeks ago, the Lock and Code podcast shared three stories about…
In a significant move to bolster productivity and efficiency, Microsoft has unveiled a suite of new features and enhancements for…
The US Department of Justice has charged a Russian national named Evgenii Ptitsyn with selling, operating, and distributing a ransomware…
Clipper, a decentralized exchange (DEX), became the target of a cyberattack that led to a loss of approximately $450,000 from…











