Rolls Royce targeted in a sophisticated Cyber Attack with potential Data Breach
04
Jan
2024

SentinelOne acquires PingSafe – Cybersecurity Insiders

SentinelOne, a leading provider of AI-based enterprise security solutions, has recently revealed its plans to acquire PingSafe, a specialized application…

SonicWall Acquires Banyan Security for security edge solutions
04
Jan
2024

SonicWall Acquires Banyan Security for security edge solutions

SonicWall has made a strategic move in the evolving cybersecurity landscape, acquiring Banyan Security, a leading provider of identity-centric Secure…

Free Decryptor Released for Black Basta Ransomware
04
Jan
2024

Free Decryptor Released for Black Basta Ransomware

A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…

FTC offers $25,000 prize for detecting AI-enabled voice cloning
04
Jan
2024

FTC offers $25,000 prize for detecting AI-enabled voice cloning

The U.S. Federal Trade Commission (FTC) has started accepting submissions for its Voice Cloning Challenge, a public competition with a…

Hackers Modifying Registry Keys and Establishing Persistence
04
Jan
2024

Hackers Modifying Registry Keys and Establishing Persistence

Persistence is one of the key things for threat actors to maintain their access to compromised systems and establish connections…

Protect your business from the inside out with zero-trust security
04
Jan
2024

Technology, regulation and the human touch: three pointers to stop cyber-crime

Geopolitical tensions, rapid advances in computing technology and the accelerated pace at which we live our lives online are raising the stakes…

Celona and Palo Alto partner to enhance private 5G network security
04
Jan
2024

Celona and Palo Alto partner to enhance private 5G network security

Private wireless services specialist Celona is shortly to debut a major integration with cyber security supplier Palo Alto Networks that…

Software Supply Chain Security
04
Jan
2024

Three Ways To Supercharge Your Software Supply Chain Security

Jan 04, 2024The Hacker NewsEthical Hacking / Vulnerability Assessment Section four of the “Executive Order on Improving the Nation’s Cybersecurity”…

Risks and opportunities for the UK chip sector
04
Jan
2024

Risks and opportunities for the UK chip sector

While there is little appetite to develop the environment for a full home-grown semiconductor industry, the government has ambitions to…

CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library
04
Jan
2024

CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent notice to federal agencies, setting a deadline of January…

CourtListener Website Crashes
04
Jan
2024

CourtListener Website Crashes After Release Of Epstein Documents

The CourtListener website, a platform hosting crucial documents related to the infamous Jeffrey Epstein case, experienced a sudden crash due…

Xerox's US subsidiary Hit by Cyber Attack: Personal Info Exposed
04
Jan
2024

Xerox’s US subsidiary Hit by Cyber Attack: Personal Info Exposed

Recently, Xerox’s US subsidiary, Xerox Business Solutions (XBS), experienced a cyber incident, prompting immediate action from Xerox’s cybersecurity personnel.  While…