The security experts at Cado Labs have recently uncovered a new crypto jacking operation that specifically targets vulnerable Redis deployments….
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google Cloud Platform allows data…
by Janelle Drolet Vice President, Business Development for Towerwall Cyber threats continue to evolve at a rapid pace, leading to…
Akamai Technologies reached a definitive agreement to acquire Ondat, a cloud-based storage technology provider with a Kubernetes-native platform for running…
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access…
Snowflake and Amazon Web Services (AWS) have unveiled a multi-year expansion of their partnership, with Snowflake growing its AWS spend…
A secret Bing Chat ‘Celebrity’ mode allows users to instruct the AI to impersonate celebrities, answering questions and talking like…
The Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen in a…
In December 2022, PayPal announced a data breach, but it claimed that the login credentials used in the attack were…
You’re not being paranoid. If you always feel like somebody’s watching you, as the song goes, you’re probably right. Especially…
Chinese hackers proved themselves to be as prolific and invasive as ever this week with new findings revealing that in…
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works…