Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter
08
Jun
2024

Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter

In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Technology…

Cybersecurity On Land And At Sea
08
Jun
2024

Cybersecurity On Land And At Sea

08 Jun Cybersecurity On Land And At Sea Posted at 08:34h in Blogs by Di Freeze This week in cybersecurity…

Geopolitical Cybersecurity
08
Jun
2024

Geopolitical Cybersecurity Tension In Today’s World

By Maryam Eissa Alhammadi, Head of Cyber Security Operation Center, Ministry of Interior “Cyberattacks are not new in Geo- Politics,…

Apple Is Coming for Your Password Manager
08
Jun
2024

Apple Is Coming for Your Password Manager

That’s not all. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click…

Cybersecurity Goals
08
Jun
2024

Achieving Cybersecurity Goals Through GRC Approach

By Anoop Kumar, Head of Information Security Governance Risk & Compliance at Gulf News We are becoming ever more dependent…

PHP Vulnerability
08
Jun
2024

New PHP Vulnerability Exposes Windows Servers to Remote Code Execution

Jun 08, 2024NewsroomVulnerability / Programming Details have emerged about a new critical security flaw impacting PHP that could be exploited…

AI-Powered Recall
08
Jun
2024

Microsoft Revamps Controversial AI-Powered Recall Feature Amid Privacy Concerns

Jun 08, 2024NewsroomArtificial Intelligence / Privacy Microsoft on Friday said it will disable its much-criticized artificial intelligence (AI)-powered Recall feature…

Securing Operational Technology Has Never Been More Crucial
08
Jun
2024

Securing Operational Technology Has Never Been More Crucial

In the field of business operations in the META region, operational technology (OT) acts as a backbone, facilitating system maintenance,…

New York Times Internal Data
08
Jun
2024

270GB of New York Times Internal Data and Source Code Leaked

An anonymous hacker has claimed to have leaked 270 GB of internal data and source code from The New York…

How AI Is Supercharging Threat Detection In Cybersecurity
08
Jun
2024

How AI Is Supercharging Threat Detection In Cybersecurity

By Srinivas Shekar, CEO and Co-Founder, Pantherun Technologies In the first quarter of 2024, the global threat landscape continued to…

Commando Cat CryptoJacking Campaign Abuses Docker API
08
Jun
2024

Commando Cat CryptoJacking Campaign Abuses Docker API

A new cryptojacking attack campaign dubbed “Commando Cat” has been observed exploiting exposed Docker remote API servers to deploy cryptocurrency…

SolarWinds fixed multiple flaws in Serv-U and SolarWinds Platform
08
Jun
2024

SolarWinds fixed multiple flaws in Serv-U and SolarWinds Platform

SolarWinds fixed multiple flaws in Serv-U and SolarWinds Platform Pierluigi Paganini June 07, 2024 SolarWinds addressed multiple vulnerabilities in Serv-U…