Hackers Steal Millions of Customers Data from UAE's Lulu Hypermarket
11
Jul
2024

Hackers Claim Millions of Customer Records

Lulu Hypermarket has experienced a major data breach, exposing over 200,000 customer records. The attack, claimed by IntelBroker hackers, includes…

McGrath Estate Agents head of technology departs
11
Jul
2024

McGrath Estate Agents head of technology departs – Training & Development

McGrath Estate Agents has lost its head of technology Darren Warner after a two-year stint that included a digital transformation…

Bitcoin
11
Jul
2024

Huione Guarantee exposed as a $11 billion marketplace for cybercrime

The seemingly legitimate online marketplace Huione Guarantee is being used as a platform for laundering money from online scams, especially…

Evolve Bank Ransomware Attack Claims 7.64 Million Victims
10
Jul
2024

Evolve Bank Ransomware Attack Claims 7.64 Million Victims

Evolve Bank & Trust, a financial institution with both traditional banking and open banking services, disclosed a data breach impacting…

Blast-RADIUS Attack blast protocol
10
Jul
2024

Blast-RADIUS Flaw Affects Common RADIUS Protocol

A critical vulnerability in the widely used RADIUS authentication protocol could allow attackers to gain unauthorized access to networks and…

Microsoft ditches OpenAI board observer seat
10
Jul
2024

Microsoft ditches OpenAI board observer seat – Software

Microsoft has given up its board observer seat at OpenAI in a move aimed at easing US and UK antitrust…

GitLab
10
Jul
2024

Critical bug lets attackers run pipelines as other users

GitLab warned today that a critical vulnerability in its product’s GitLab Community and Enterprise editions allows attackers to run pipeline…

ViperSoftX malware covertly runs PowerShell using AutoIT scripting
10
Jul
2024

ViperSoftX malware covertly runs PowerShell using AutoIT scripting

The latest variants of the ViperSoftX info-stealing malware use the common language runtime (CLR) to load and execute PowerShell commands…

Jane Devry
10
Jul
2024

Ditch the Checkbox, Use Plain Language, Make It Real: How to Create an Information Security Policy That Works

Information security policies are a table-stakes requirement for any significantly sized organization today but too often they are a mess…

CISA
10
Jul
2024

CISA urges devs to weed out OS command injection vulnerabilities

​CISA and the FBI urged software companies on Wednesday to review their products and eliminate path OS command injection vulnerabilities…

Jane Devry
10
Jul
2024

AI and Ethics: Expert Insights on the Future of Intelligent Technology

The history of artificial intelligence (AI) is a fascinating journey of innovation and discovery that spans decades. From the early…

Civil servant was lone voice on Post Office board to query legal plan that blew taxpayers' cash
10
Jul
2024

Civil servant was lone voice on Post Office board to query legal plan that blew taxpayers’ cash

The civil servant on the Post Office board during subpostmasters’ High Court litigation battle has said he was alone in…