By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction…
By Srinivasan CR, Executive Vice President-Cloud and Cybersecurity Services & Chief Digital Officer, Tata Communications In a hyperconnected world, cyberattacks…
Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across…
In collaboration with Red Balloon Security, Narf Industries, and Niyo Little Thunder Pearson (ONEGas, Inc.), MITER has unveiled EMB3D, a…
In a significant development for cybersecurity in critical infrastructure, MITRE Corporation has launched a new threat-modeling framework known as EMB3D….
ChatGPT maker OpenAI said it would release a new AI model called GPT-4o, capable of realistic voice conversation and able…
Apple has backported security patches released in March to older iPhones and iPads, fixing an iOS Kernel zero-day tagged as…
An Australian court has rejected a bid by the country’s cyber safety regulator to extend a temporary order for Elon…
Threat actors may have exploited a zero-day in older iPhones, Apple warns Pierluigi Paganini May 13, 2024 Apple rolled out…
A new package mimicked the popular ‘requests’ library on the Python Package Index (PyPI) to target macOS devices with the Sliver…
A cybercriminal using the name “salfetka” claims to be selling the source code of INC Ransom, a ransomware-as-a-service (RaaS) operation…
The Commonwealth Bank of Australia is building digital twins on Confluent’s event-streaming platform to analyse its financial planning systems and…











