Gender diversity in the cyber security profession is improving, according to an ISC2 report on women in cyber security, which…
Meta, encompassing Facebook and its subsidiaries, has staunchly advocated the end-to-end encryption safeguarding its messaging platforms, assuring users of protection…
Post Office executive Angela van den Bogerd was part of the subterfuge adopted by the company to hide problems with…
Salt Security have announced the release of its new multi-layered OAuth protection package to detect attempts to exploit OAuth and…
Salesforce senior vice-president of artificial intelligence (AI) Jayesh Govindarajan leads the company’s AI organisation and is responsible for the family…
Security researchers have discovered a new Android banking trojan they named Brokewell that can capture every event on the device,…
Amazon’s Ring has settled with the Federal Trade Commission (FTC) over charges that the company allowed employees and contractors to…
CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 25, 2024 U.S. CISA…
Hackers have started to target a critical severity vulnerability in the WP Automatic plugin for WordPress to create user accounts…
Rodriguez and Hill, founders of the cryptocurrency mixing service Samourai, have been arrested for operating an unlicensed money-transmitting business and…
Last week, the IT Security Guru team attended Cydea’s Risk Management Platform launch in London. After the event, Robin Oldham,…
In today’s information age, businesses are increasingly reliant on interconnected networks and cloud infrastructures, and protecting digital assets against cyber…











