The UK has taken a pioneering step by introducing new laws aimed at safeguarding consumers against hacking and cyber-attacks while…
Deciding that the first stop in the Journey should be a CI cluster, the team started drafting plans. Plans on how…
Google blocked 2.28 million Android apps from being published on Google Play after finding various policy violations that could threaten user’s security….
London Drugs, a British Columbia-based company with a robust pharmaceutical supply chain serving Western Canada, recently announced the closure of…
Apr 29, 2024NewsroomProgramming / Supply Chain A security vulnerability has been discovered in the R programming language that could be…
Microsoft has fixed a known issue causing incorrect BitLocker drive encryption errors in some managed Windows environments. The company said…
Cybersecurity experts have meticulously traced the timeline of a sophisticated ransomware attack that spanned 29 days from the initial breach…
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold…
Apr 29, 2024NewsroomDNS Security / Cyber Espionage A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated…
Hacktivists claimed breaching the network of Belarusian intelligence agency and allegedly leaked their data in response to the intelligence chief’s…
Financial Business and Consumer Solutions (FBCS) data breach impacted 2M individuals Pierluigi Paganini April 29, 2024 Financial Business and Consumer…
Every organization has its strategy of alerting and on-call. The experience of being on-call in different teams for different stacks…










