The next year is going to be the year that sustainability becomes commonplace in IT projects. Cop28 has had many…
Dec 15, 2023NewsroomCryptocurrency / Malware Crypto hardware wallet maker Ledger published a new version of its “@ledgerhq/connect-kit” npm module after…
In my last column, I explored some of the great steps that the UK technology sector has taken towards sustainability…
Ledger, a crypto wallet firm, recently fell victim to a security breach on December 14. The intrusion into Ledger’s Connect…
Multiple flaws in pfSense firewall can lead to arbitrary code execution Pierluigi Paganini December 15, 2023 Security flaws in Netgate…
Dec 15, 2023NewsroomVulnerability / Software Security Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called…
A new report from the United Nations Convention for Climate Change (UNFCCC) finds national climate action plans remain insufficient to…
A cluster of malicious Python projects has been identified in PyPI, the official Python PyPI package repository, which targets both Windows…
Recently, there has been a rise in incidences of hackers using “Remote Administration Tools” to control the infected system and…
Web Application Security consists of a myriad of security controls that ensure that a web application: Functions as expected. Cannot…
The government has been advised to overturn all the convictions of the hundreds of subpostmasters wrongly accused in the Post…
Multiple vulnerabilities have been discovered in Dell’s PowerProtect, which were associated with SQL injection, cross-site scripting (XSS), privilege escalation, command…









