Keep your drafts out of the public eye by making use of continuous deployment tools to publish your public GitHub…
Transparent Tribe (aka APT36), an APT group based in Pakistan, has recently been found employing a stealthy tactic to distribute…
By Pat McGarry, CTO of There are two indisputable facts about the cybersecurity industry right now. One, we are still…
Apr 20, 2023Ravie LakshmananCloud Security / Vulnerability A chain of two critical flaws has been disclosed in Alibaba Cloud’s ApsaraDB…
Google Cloud’s Mandiant says it has observed what appears to be the first ever instance of a double software supply chain…
Microsoft is investigating an ongoing outage blocking customers worldwide from accessing and using web apps and online services. The list…
In 2022, NSO Group, the Israeli firm notorious for its spyware technology, reemerged with a slew of zero-click exploit chains…
Apr 20, 2023The Hacker NewsArtificial Intelligence / Data Safety In the short time since their inception, ChatGPT and other generative…
Code First Girls and the MotherBoard Movement have partnered to launch the #MumsWhoCode campaign aimed at recognising technology employers that…
It is a new day with new challenges. Scope has shifted for the next part of our LHE. Today, you…
London-based professional outsourcing giant Capita has published an update on the cyber-incident that impacted it at the start of the…
Insider “threat” is a bit of a misnomer. Most insiders aren’t looking to cause harm. At best, they believe they’re…