Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly…
Staying ahead of security measures and exploiting new vulnerabilities requires hackers to change their tactics. By doing so, they manage…
Shadow IT – the use of software, hardware, systems and services that haven’t been approved by an organization’s IT/IT Sec…
The Cybersecurity and Infrastructure Security Agency (CISA) has recently released an essential advisory on Industrial Control Systems (ICS). The CISA One…
Polycab India Limited, a leading manufacturer of wires and cables, has reported a significant ransomware attack on its IT infrastructure….
A group of cybersecurity researchers has uncovered several critical security flaws in the Saflok electronic RFID locks by Dormakaba. These…
Russia implemented a sweeping ban on Microsoft Cloud services on March 20th, with plans to extend the prohibition to Google…
Financially motivated hackers have been leveraging SmokeLoader malware in a series of phishing campaigns predominantly targeting Ukrainian government and administration…
Mar 22, 2024NewsroomPrivacy / Encryption The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general,…
Pwn2Own Vancouver 2024 has ended with security researchers collecting $1,132,500 after demoing 29 zero-days (and some bug collisions). Throughout the event,…
Despite JavaScript’s widespread use, writing secure code remains challenging, leading to web application vulnerabilities. Experiments on real-world vulnerabilities show LLMs…
QR codes, once a simple tool for scanning and accessing information swiftly, have become a ubiquitous feature in our digital…











