Two suspected cyber criminals associated with the LockBit ransomware operation have been arrested in Poland and Ukraine as part of…
Woolworths has reported strong growth in its WooliesX business, as the retail giant’s performance was dragged to a $781 million…
End-to-end encrypted messaging app Signal finally allows users to pick custom usernames to connect with others while protecting their phone number…
[By Paul Fuegner – QuSecure] The rapid advances we are seeing in emerging technologies like AI, ML and quantum computing…
Feb 20, 2024NewsroomVulnerability / Network Security ConnectWise has released software updates to address two security flaws in its ScreenConnect remote…
The US request to extradite WikiLeaks founder Julian Assange, was “state retaliation” for exposure of classified documents which revealed alleged…
An international law enforcement operation led by Britain’s National Crime Agency and the FBI has arrested and indicted members of…
Security researchers discovered a new campaign that targets Redis servers on Linux hosts using a piece of malware called ‘Migo’…
Tom Madsen’s upcoming book, “Zero-trust – An Introduction,” offers readers a comprehensive guide to implementing and managing a zero-trust architecture…
[By Doug Dooley, COO, Data Theorem] The rise of OpenAI and new changes with ChatGPT-4 Turbo will help to revolutionize…
Feb 20, 2024NewsroomHacking / Cyber Espionage North Korean state-sponsored threat actors have been attributed to a cyber espionage campaign targeting…
The University of Lincoln has shared details of the work it has done to ensure the uptime and resiliency of…











