Google shows Microsoft Cybersecurity failures to US Government to gain business
22
May
2024

Google shows Microsoft Cybersecurity failures to US Government to gain business

Google has embarked on an unprecedented move, revealing cybersecurity vulnerabilities of its competitor to the United States government in a…

Chinese
22
May
2024

Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries

Cybersecurity researchers have disclosed details of a previously undocumented threat group called Unfading Sea Haze that’s believed to have been…

Podcast: AI and its impact on data storage
22
May
2024

Podcast: AI and its impact on data storage

In this podcast, we look at the impact of artificial intelligence (AI) processing on data storage with Shawn Rosemarin, vice-president…

CentroMed Data Breach Exposed 400,000 Patient Records
22
May
2024

CentroMed Data Breach Exposed 400,000 Patient Records

El Centro Del Barrio, operating as CentroMed, an integrated primary care clinic, confirms a recent cyberattack marking its second breach…

Enhancing Security Solutions through AWS Marketplace Integration
22
May
2024

Enhancing Security Solutions through AWS Marketplace Integration

AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced today that its proprietary search engine, Criminal IP, is…

Fortifying Digital Health Against Cyber Attacks
22
May
2024

Fortifying Digital Health Against Cyber Attacks

By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological…

Kelp DAO Secures $9 Million in Private Sale for Restaking Innovations
22
May
2024

Kelp DAO Secures $9 Million in Private Sale for Restaking Innovations

Kelp DAO, a liquid restaking platform, today announced the closure of a $9 million private sale round, a milestone in…

Safeguard Your Future with Seven Layers of Data Resilience
22
May
2024

Safeguard Your Future with Seven Layers of Data Resilience

Organizations have been doing backup and recovery for decades and many feel that they have reactive data protection under control….

Strike Graph VerifyAI gives businesses flexibility and control for audits
22
May
2024

Strike Graph VerifyAI gives businesses flexibility and control for audits

Strike Graph launches VerifyAI, an innovative AI-powered technology for intelligent testing that goes beyond basic security control automation to understand…

Dutch employers should discuss using algorithms in managing staff
22
May
2024

Dutch employers should discuss using algorithms in managing staff

Organisations are increasingly turning to algorithms to manage and evaluate various aspects of work. This form of algorithmic management can…

Drivers Exploited To Deploy GHOSTENGINE Payload
22
May
2024

Drivers Exploited To Deploy GHOSTENGINE Payload

Cybersecurity researchers uncovered a sophisticated cryptojacking campaign that leverages vulnerable drivers to disable well-known security solutions, thereby evading detection. This…

A malware campaign exploits Microsoft Exchange Server flaws
22
May
2024

A malware campaign exploits Microsoft Exchange Server flaws

An ongoing malware campaign exploits Microsoft Exchange Server flaws Pierluigi Paganini May 22, 2024 A threat actor is targeting organizations…