Flash storage pioneer Pure Storage recently announced it will upgrade its Fusion control plane to make storage capacity in its…
DORA focuses on Information and Communications Technology (ICT) systems and applies to all financial institutions in the EU. This includes…
Countdown to October 2025 As the cybersecurity landscape continues to evolve and become more complex, international regulations are similarly following…
09 Jul Grappling With The Cybersecurity Talent Shortfall Posted at 08:48h in Blogs by Di Freeze This week in cybersecurity…
Lookout discovered GuardZoo, Android spyware targeting Middle Eastern military personnel. This campaign leverages malicious apps with military and religious themes…
Jul 09, 2024NewsroomCI/CD Security / Server Security Cybersecurity researchers have found that it’s possible for attackers to weaponize improperly configured…
While data has the potential to boost the UK economy significantly, the links between data and AI are not sufficiently…
The UK and its international allies have issued a new advisory shedding light on the evolving techniques of China state-sponsored…
A massive data leak involving Truecaller, the popular caller ID and spam-blocking app, has reportedly exposed the personal information of…
The FIDO Alliance is working to enable a world without passwords in which passkeys implement secure, phishing-resistant authentication based on public key…
New Golang botnet “Zergeca” evades detection and launches DDoS attacks. Ensure your IoT devices are fully patched against vulnerabilities and…
Chinese state-sponsored cyber group APT40 is amazingly fast at adapting public proof-of-concept (PoC) exploits for vulnerabilities in widely used software,…











