The recent earthquake in Taiwan has further highlighted the fragility of the semiconductor chip supply chain. Any impact on the…
US electric utilities predict a tidal wave of new demand from data centres powering technology like generative AI, with some…
A threat actor is using a PowerShell script that was likely created with the help of an artificial intelligence system…
ESET researchers have unveiled an espionage campaign called eXotic Visit. The campaign targets Android users by masquerading as benign messaging…
Attackers are now leveraging encrypted phishing emails that utilize Scalable Vector Graphics (SVG) files to execute malicious JavaScript code. The…
The cybersecurity landscape is undergoing a rapid and relentless transformation. Traditional, reactive approaches are no longer sufficient to counter the…
[By Perry Carpenter, chief evangelist and security officer, KnowBe4] If burglars were breaking into your front door every day,…
Apr 10, 2024NewsroomCyber Crime / Malvertising Cybersecurity researchers have discovered a new Raspberry Robin campaign wave that propagates the malware…
The source code for the decision engine underpinning HM Revenue & Customs’ (HMRC’s) much-maligned Check Employment Status for Tax (CEST)…
The Rust programming language has a standard library on Windows that gives attackers a way to execute shell commands. Rated…
AT&T is notifying 51 million former and current customers, warning them of a data breach that exposed their personal information…
Cyber GRC software company Cypago has announced a new automation solution for artificial intelligence (AI) governance, risk management and compliance….










