The way we work has drastically changed over the last few years. Our data, users, devices, and applications are now…
A proof-of-concept (PoC) exploit for a critical Veeam Recovery Orchestrator authentication bypass vulnerability tracked as CVE-2024-29855 has been released, elevating the…
The ‘cybersecurity poverty line’ was a term coined over ten years ago by a Cisco security leader, Wendy Nather. We…
The potential of artificial intelligence (AI) to help companies measure and optimise their sustainability efforts could be outweighed by the…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert about a recent impersonation scam in which scammers…
Cybersecurity firm Resecurity has uncovered the latest campaign from the notorious cybercriminal group Smishing Triad targeting smartphone users in Pakistan….
Traceable AI just released a report on the escalating concerns surrounding API security within the financial services sector. The comprehensive…
The Labour Party manifesto for the 2024 general election has promised to support the tech and digital sectors through a…
Please see below comments by Kevin Surace, Chair, Token & “Father of the Virtual Assistant” for your consideration regarding ant…
In the aftermath of the Synnovis ransomware attack that struck last week, London hospitals continue to struggle to deliver patient…
Jun 13, 2024NewsroomThreat Intelligence / Mobile Security The threat actor known as Arid Viper has been attributed to a mobile…
A vulnerability in the Microsoft Windows Error Reporting Service, which was identified and patched three months ago in the March…











