Leading snowboard maker Burton Snowboards confirmed notified customers of a data breach after some of their sensitive information was “potentially”…
By Jayakumar (Jay) Kurup, Global Sales Engineering Director at Securing operational technology (OT) creates unique challenges. Zero tolerance of downtime…
To all those who are concerned about Netflix’s decision to ban password sharing in almost 100 countries, here’s a solution…
Use Source Code Assessments to Audit DevOps DevOps teams may care about security, but it is not their area of…
Google has removed from the Chrome Web Store 32 malicious extensions that could alter search results and push spam or…
Jun 02, 2023Ravie LakshmananBotnet / Malware Spanish-speaking users in Latin America have been at the receiving end of a new…
Cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) have recently uncovered an ongoing campaign by the sophisticated hacking group…
LockBit ransomware group has claimed to hit YKK Group, the world’s largest zipper manufacturer, and has given the company a…
A recently discovered vulnerability called “Migraine” is linked to macOS migration and poses a serious threat. It enables attackers with…
Data security is reinventing itself. As new data security posture management solutions come to market, organizations are increasingly recognizing the…
Kaspersky recently reported that a number of iPhones connected to its network were compromised through an iOS vulnerability. The attackers…
Following the UK Cyber Security Council’s Ethnic Minorities in Cyber Symposium and wider consultation with our members, the Council has…