CISOs need to think about risks before rushing into AI
Organizations are increasing investments in cloud, AI, and emerging technologies, but their infrastructure and security strategies often lag behind. A...
Read more →Organizations are increasing investments in cloud, AI, and emerging technologies, but their infrastructure and security strategies often lag behind. A...
Read more →How often do you hear people talking about issues of legacy systems—especially in critical infrastructure environments? Here’s another example of...
Read more →Britain has dropped its demand for the iPhone maker Apple to provide a “backdoor” that would have enabled access to...
Read more →US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin Pierluigi Paganini August...
Read more →Orange Belgium, a subsidiary of telecommunications giant Orange Group, disclosed on Wednesday that attackers who breached its systems in July...
Read more →A Russian state-sponsored cyber espionage group designated as Static Tundra has been actively exploiting a seven-year-old vulnerability in Cisco networking...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) released four critical Industrial Control Systems (ICS) advisories on August 19, 2025, alerting...
Read more →Doppel announced Doppel Simulation, a new product and expansion to the Doppel Vision Platform that enables organizations to redefine security...
Read more →A newly discovered technique, dubbed DOM-based extension clickjacking, has raised serious concerns about the security of browser-based password managers. Despite...
Read more →The University of Melbourne has been reprimanded for using wi-fi location data to identify students involved in a sit-in protest...
Read more →A critical security vulnerability has been discovered in Apache Tika’s PDF parser module that could enable attackers to access sensitive...
Read more →Apple has issued an emergency security update for iOS 18.6.2 and iPadOS 18.6.2 to address a critical zero-day vulnerability that...
Read more →