[By Dominik Samociuk, PhD, Head of Security at Future Processing] When more than 6 million articles of ancestry and genetic…
The NSW Rural Fire Service (RFS) is seeking a new chief information officer (CIO) following the departure of John Danson…
A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the…
The Shadowserver Foundation reports that a zero-day vulnerability, CVE-2024-21893 (CVSS score 8.2), disclosed by Ivanti on 31 January 2024, is…
Meta Platforms will begin detecting and labelling images generated by other companies’ artificial intelligence services in the coming months, using…
Google fixed an Android critical remote code execution flaw Pierluigi Paganini February 06, 2024 Google released Android ’s February 2024…
JetBrains urged customers today to patch their TeamCity On-Premises servers against a critical authentication bypass vulnerability that can let attackers…
A man faces up to 25 years in prison for his role in operating unlicensed crypto exchange BTC-e Pierluigi Paganini…
Commercial spyware vendors (CSV) were behind 80% of the zero-day vulnerabilities Google’s Threat Analysis Group (TAG) discovered in 2023 and…
Happy Safer Internet Day to all those who celebrate! Cybersecurity experts from across the industry have weighed in on how…
Meanwhile, Julia Weis, a spokesperson for the Swiss messaging app Threema, says that while WhatsApp did approach it to discuss…
Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source…











