Hollywood has colourful notions about artificial intelligence (AI). The popular image is a future where robot armies spontaneously turn to…
Credit: Australian National Maritime Museum. A third-party IT contractor working at the Australian National Maritime Museum allegedly accessed its accounting…
The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach…
By Ashley Burke, Information Security Program Manager I can’t believe it’s been two years already! I feel like I just…
The security experts at Cado Labs have recently uncovered a new crypto jacking operation that specifically targets vulnerable Redis deployments….
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google Cloud Platform allows data…
by Janelle Drolet Vice President, Business Development for Towerwall Cyber threats continue to evolve at a rapid pace, leading to…
Akamai Technologies reached a definitive agreement to acquire Ondat, a cloud-based storage technology provider with a Kubernetes-native platform for running…
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access…
Snowflake and Amazon Web Services (AWS) have unveiled a multi-year expansion of their partnership, with Snowflake growing its AWS spend…
A secret Bing Chat ‘Celebrity’ mode allows users to instruct the AI to impersonate celebrities, answering questions and talking like…
The Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen in a…