Tuta
12
Mar
2024

Tuta Mail adds new quantum-resistant encryption to protect email

Tuta Mail has announced TutaCrypt, a new post-quantum encryption protocol to secure communications from powerful and anticipated decryption attacks. Tuta…

EU Commission's use of Microsoft software breached privacy rules
12
Mar
2024

EU Commission’s use of Microsoft software breached privacy rules – Cloud

The European Commission’s use of Microsoft software breached EU privacy rules and the bloc’s executive also failed to implement adequate…

Okta
11
Mar
2024

Okta says data leaked on hacking forum not from its systems

Okta denies that its company data was leaked after a threat actor shared files allegedly stolen during an October 2023…

More than 275 AI and automated decision tools in NSW public sector
11
Mar
2024

More than 275 AI and automated decision tools in NSW public sector – Software

A NSW government survey has uncovered the presence of over 275 automated decision-making tools (ADMs), raising questions about how the tools…

Researchers expose Microsoft SCCM misconfigs usable in cyberattacks
11
Mar
2024

Researchers expose Microsoft SCCM misconfigs usable in cyberattacks

Security researchers have created a knowledge base repository for attack and defense techniques based on improperly setting up Microsoft’s Configuration…

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’
11
Mar
2024

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

By Brett Raybould, EMEA Solutions Architect, Menlo Security  Phishing remains one of the most prevalent challenges facing organisations, with more…

Next Autopilot trial to test Tesla's blame-the-driver defence
11
Mar
2024

Next Autopilot trial to test Tesla’s blame-the-driver defence – Software

Six weeks before the first fatal US accident involving Tesla’s Autopilot in 2016, the automaker’s president Jon McNeill tried it…

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox
11
Mar
2024

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics…

The Balancing Act for Mid-Market Firms:  Navigating Digital Growth and Security Hurdles
11
Mar
2024

The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market…

Magnet Goblin Hackers Using Ivanti Flaws to Deploy Linux Malware
11
Mar
2024

Magnet Goblin Hackers Using Ivanti Flaws to Deploy Linux Malware

Hackers exploit unpatched Ivanti vulnerabilities to deploy malware on Linux systems. Magnet Goblin targets businesses using outdated software. Patch immediately…

ImmuniWeb AI Platform
11
Mar
2024

ImmuniWeb AI Platform – Cyber Defense Magazine

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb…

The 4 Big Questions the Pentagon’s New UFO Report Fails to Answer
11
Mar
2024

The 4 Big Questions the Pentagon’s New UFO Report Fails to Answer

But what, then, were those programs? Herein lies the most intriguing—and potentially ground-breaking—question that the Pentagon study leaves us wondering:…