Chronon: Open-source data platform for AI/ML applications
27
May
2024

Chronon: Open-source data platform for AI/ML applications

Chronon is an open-source, end-to-end feature platform designed for machine learning (ML) teams to build, deploy, manage, and monitor data…

Fake Antivirus Websites Malware
27
May
2024

Fake Antivirus Websites Delivering Windows & Android Malware

Fake antivirus websites are now a major cybersecurity threat, spreading malware to both Windows and Android devices. These malicious sites…

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack
27
May
2024

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack

State-sponsored hackers recently exploited vulnerabilities in MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE). They used rogue virtual machines (VMs)…

Automic CIO scratches itch for weekly security improvements
27
May
2024

Automic CIO scratches itch for weekly security improvements – Finance – Software

Automic Group is taking a multi-pronged approach to its information security, using a mix of tooling, testing and weekly security…

eSafety and foreign regulators to sync content bans and oversight schemes
27
May
2024

eSafety and foreign regulators to sync content bans and oversight schemes – Software

Eight nations are syncing their content restriction, user surveillance, corporate disclosure and other oversight powers aimed at mitigating online harms….

ChatGPT still not meeting European data accuracy standards
27
May
2024

ChatGPT still not meeting European data accuracy standards – Software

OpenAI’s efforts to produce less factually false output from its ChatGPT chatbot are not enough to ensure full compliance with…

Home Affairs' ICT modernisation needs backed by another review
26
May
2024

Home Affairs’ ICT modernisation needs backed by another review – Strategy – Software

A capability review of Home Affairs has re-made the case for greater support and resourcing for the department’s technology function,…

Anatomy Of an Endpoint Attack: How A Cyberattack Can Compromise an Enterprise Network
26
May
2024

Anatomy Of an Endpoint Attack: How A Cyberattack Can Compromise an Enterprise Network

By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect…

Becoming Resilient to The Cyber Incidents of Today And Tomorrow
26
May
2024

Becoming Resilient to The Cyber Incidents of Today And Tomorrow

By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are…

Protecting Against Data Breaches With Cybersecurity Strategies
26
May
2024

Protecting Against Data Breaches With Cybersecurity Strategies

By Reuben Koh, Director, Security Strategy – Asia Pacific & Japan, Akamai Technologies  The cybersecurity landscape is rife with evolving threats,…

CERT-UA warns of malware campaign conducted by threat actor UAC-0006
26
May
2024

CERT-UA warns of malware campaign conducted by threat actor UAC-0006

CERT-UA warns of malware campaign conducted by threat actor UAC-0006 Pierluigi Paganini May 26, 2024 The Ukraine CERT-UA warns of…

TCE Cyberwatch
26
May
2024

List Of All The Major Data Breaches

This week on TCE Cyberwatch, we bring you news of new vulnerabilities that have cropped up, along with threats of…