Acuity, a federal contractor that works with U.S. government agencies, has confirmed that hackers breached its GitHub repositories and stole…
Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging…
The notorious hacker IntelBroker claims responsibility for Home Depot’s alleged data breach, exposing employee names, email addresses and departments –…
Panera Bread’s recent week-long outage was caused by a ransomware attack, according to people familiar with the matter and emails…
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…
In a groundbreaking Check Point Research (CPR) analysis, vulnerabilities have been uncovered in several popular dating applications, cumulatively boasting over…
There are hopes a that long-awaited legislative tweak to the IR35 off-payroll working rules, due to come into force from…
A sophisticated vulnerability within the Magento ecommerce platform has been unveiled, posing a significant threat to online merchants and shoppers…
YubiKey Manager GUI on Windows before version 1.2.6 has a vulnerability that could allow an attacker to escalate privileges. Due…
05 Apr Cybersecurity Governance: A Path To Cyber Maturity This week in cybersecurity from the editors at Cybercrime Magazine –…
The frequency and severity of datacentre-related outages are going down, according to resiliency think-tank Uptime Institute. The organisation’s sixth annual…
Cybersecurity firm Mandiant has uncovered a series of sophisticated cyberattacks targeting Ivanti Connect Secure VPN appliances. These attacks, attributed to…











