Police takes down Matrix encrypted chat service used by criminals
03
Dec
2024

Police takes down Matrix encrypted chat service used by criminals

A joint investigation team involving French and Dutch authorities has taken down Matrix, yet another end-to-end encrypted chat service created…

Microsoft hit with £1bn UK legal claim over ‘anti-competitive’ cloud licensing tactics
03
Dec
2024

Microsoft hit with £1bn UK legal claim over ‘anti-competitive’ cloud licensing tactics

 Microsoft has found itself on the receiving end of £1bn legal action, filed on behalf of thousands of UK businesses…

A complete guide to exploiting advanced authentication vulnerabilities
03
Dec
2024

A complete guide to exploiting advanced authentication vulnerabilities

Authentication vulnerabilities are fun to find as they are impactful by nature and often grant unauthorized users access to various…

Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow
03
Dec
2024

Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow

The cyber world needs your expertise. But the security leaders of tomorrow require a broad set of skills that job…

Masters Of Deception (MOD) Member On The Great Hacker War
03
Dec
2024

Masters Of Deception (MOD) Member On The Great Hacker War

John Lee, a.k.a. John Threat, used the name “Corrupt” as a member of Masters of Deception (MOD), a New York based…

Cisco Warns of Exploitation of Decade-Old ASA WebVPN Vulnerability
03
Dec
2024

Cisco Warns of Exploitation of Decade-Old ASA WebVPN Vulnerability

Dec 03, 2024Ravie LakshmananVulnerability / Network Security Cisco on Monday updated an advisory to warn customers of active exploitation of…

Top US Consumer Watchdog Has a Plan to Fight Predatory Data Brokers
03
Dec
2024

Top US Consumer Watchdog Has a Plan to Fight Predatory Data Brokers

The CFPB’s idea of using existing US law to regulate data brokers is not novel. In February 2023, a group…

Phishers send corrupted documents to bypass email security
03
Dec
2024

Phishers send corrupted documents to bypass email security

Phishers have come up with a new trick for bypassing email security systems: corrupted MS Office documents. The spam campaign…

AIOps and storage management: What it is and who provides it
03
Dec
2024

AIOps and storage management: What it is and who provides it

Artificial intelligence (AI) is an obvious candidate to take some of the load off IT administrators. By using AI to automate…

Employee Accuses Company Of Surveillance
03
Dec
2024

Employee Accuses Company Of Surveillance

A current Apple employee has filed a lawsuit against the tech giant, accusing the company of using invasive surveillance tactics…

ENGlobal Corporation discloses a ransomware attack
03
Dec
2024

ENGlobal Corporation discloses a ransomware attack

Energy industry contractor ENGlobal Corporation discloses a ransomware attack Pierluigi Paganini December 03, 2024 ENGlobal Corporation disclosed a ransomware attack,…

The Ultimate Guide to Designing a Logo Online: Tools, Tips, and Tricks
03
Dec
2024

The Ultimate Guide to Designing a Logo Online: Tools, Tips, and Tricks

A logo is more than just a visual element—it’s the cornerstone of your brand identity. It communicates your business’s values,…