A good cyber security strategy should always start by defining what risk a business is willing to tolerate, and this…
by Gaurav Sahay, Practice Head (Technology & General Corporate), Fox Mandal & Associates In an age where the digital realm…
BleepingComputer has discovered a content farm operating some 60+ domains named after popular media outlets, including the BBC, CNBC, CNN,…
The 20 winners of the Most Inspiring Women in Cyber Awards were announced at a ceremony held at the prestigious…
The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie Nasab, for his alleged involvement in…
Samip Aryal, a cybersecurity researcher and an ethical hacker from Nepal, bypassed the system’s rate-limiting feature and subsequently checked possible…
It’s quite alarming to hear about the advancements in cyber-attacks, especially those fueled by AI and capable of causing physical…
March 1, 2024 – Scammers are attacking Mac users interested in cryptocurrencies using a fake fix for a meeting link…
Mar 04, 2024NewsroomAI Security / Vulnerability As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered…
As more companies adopt public cloud, most choose a hybrid cloud strategy. This is because legacy workloads and applications aren’t…
Stoney Creek Furniture, a well-known retailer, has reportedly been targeted by the infamous MEDUSA ransomware group. The Stoney Creek Furniture…
Threat actors hacked Taiwan-based Chunghwa Telecom Pierluigi Paganini March 04, 2024 Threat actors stole sensitive and confidential data from the…











