The workplace experiences of women in cybersecurity are dramatically worse than men across virtually every category, according to a WiCyS…
Developing a successful contact centre, that customers actually like to use, is something of a black art. It’s important because…
Employee offboarding isn’t anybody’s favorite task—but it’s a critical IT process that needs to be executed diligently and efficiently. According…
Cyber GRC software provider Cypago has launched a new automation solution for AI governance, risk management, and compliance. This includes…
LastPass revealed this week that threat actors targeted one of its employees in a voice phishing attack, using deepfake audio…
Restaurant reservation platform OpenTable says that all reviews on the platform will no longer be fully anonymous starting May 22nd…
Open Source Intelligence tools (or OSINT tools) are software applications or platforms used to collect, analyze, and interpret publicly available…
The US Cybersecurity and Infrastructure Security Agency said Russian government-backed hackers have used their access to Microsoft’s email system to…
CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 11, 2024 U.S. Cybersecurity…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new version of “Malware Next-Gen,” now allowing the public…
Apple has warned its users in India and 91 other countries that they were possible victims of a “mercenary spyware…
Apple has been notifying iPhone users in 92 countries about a “mercenary spyware attack” attempting to remotely compromise their device. In…











