Charities and healthcare organisations working with HIV positive people are persistently failing to take account of their basic data protection…
CISA guidelines to protect critical infrastructure against AI-based threats Pierluigi Paganini April 30, 2024 The US government’s cybersecurity agency CISA…
Three large-scale campaigns targeted Docker Hub users, planting millions of repositories that pushed malware and phishing sites since early 2021. As…
The disruption to GPS services started getting worse on Christmas day. Planes and ships moving around southern Sweden and Poland…
Cloud-based zero-trust and zero-knowledge software specialist Keeper Security has joined storied Formula 1 team Williams Racing as an official partner…
A new Android backdoor malware named ‘Wpeeper’ has been spotted in at least two unofficial app stores mimicking the Uptodown…
Barnsley Council has deployed Copilot for Microsoft 365 at scale to integrate across the systems council workers use every day,…
In today’s digital landscape, the threat of ransomware attacks looms over businesses of all sizes and industries. The emergence of…
Foreign ministers from states around the world are calling for multilateral action to safeguard humanity against the growing threat of…
As we have in previous editions of the ThreatStats report, we highlight the industry’s top API-related attacks and trends. New…
Vulnerability exploits are the third most common way that cybercriminals gain access to target organizations, surpassed only by credential stealing…
Trends to Look Out for in 2024 By Yashin Manraj, CEO, Pvotal Technologies For cybersecurity professionals, remaining effective requires staying…











