The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority…
15 May Bookworms Beware: Hackers Launch Cyberattacks On Libraries Globally Posted at 09:22h in Blogs by Di Freeze This week…
An unnamed European Ministry of Foreign Affairs (MFA) and its three diplomatic missions in the Middle East were targeted by…
New research into password usage for new accounts during the onboarding process, has revealed a worrying trend where easily guessable…
Hackers exploit the Windows zero-day vulnerabilities, as they offer great advantages. This means that no patches or defenses exist for…
FIDO2 (Fast Identity Online 2) authentication has been hailed for its security, protecting users from phishing, session hijacking, and some…
Apple and Google have announced an industry specification for Bluetooth tracking devices which help alert users to unwanted tracking. The…
Here’s How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was…
The government has provided guidance to help artificial intelligence (AI) developers improve cyber security in AI models. The Department for…
A Dutch court ruling on Tuesday found one of the co-founders of the now-sanctioned Tornado Cash cryptocurrency mixer service guilty…
The notorious DragonForce ransomware group has expanded its list of victims, adding two new names to their dark web portal…
Cybersecurity experts from Recorded Future’s Insikt Group have uncovered a sophisticated cybercriminal campaign orchestrated by Russian-speaking threat actors from the…










