The Smith Family hunts for new cyber chief – Training & Development – Security
National education support charity The Smith Family is looking for a replacement for its former CISO Andrew Wan who left in May last year. Wan…
National education support charity The Smith Family is looking for a replacement for its former CISO Andrew Wan who left in May last year. Wan…
HMG Healthcare disclosed a data breach Pierluigi Paganini January 10, 2024 The Healthcare services provider HMG Healthcare has disclosed a data breach that impacted 40…
Cisco has patched a critical Unity Connection security flaw that can let unauthenticated attackers remotely gain root privileges on unpatched devices. Unity Connection is a…
Microsoft has issued patches for 48 security vulnerabilities in the first Patch Tuesday of 2024. With a relatively low number of patches—and only two of…
Artificial intelligence lab OpenAI has launched its GPT Store, a marketplace for personalised artificial intelligence (AI) applications, the company said in a blog post. The…
A pro-Ukraine hacktivist group named ‘Blackjack’ has claimed a cyberattack against Russian provider of internet services M9com as a direct response to the attack against…
Volkswagen claims that ChatGPT will enhance conversations, respond to queries, supply vehicle-specific details, and provide additional features for drivers. Get ready for car chats that…
Last year, we documented malware distribution campaigns both via malvertising and compromised sites delivering Atomic Stealer (AMOS) onto Mac users. This stealer has proven to…
Threat actors are using communication about personal pension accounts (the 401(k) plans in the U.S.), salary adjustments, and performance reports to steal company employees’ credentials.…
Stuxnet, a name that resonates with infamy in the cybersecurity world, represents a watershed moment in digital warfare. This sophisticated piece of malware, allegedly costing…
In the world of emerging cybersecurity threats, understanding the significance of threat intelligence is crucial and can not be ignored. Threat intelligence involves the systematic…
Hackers have ventured into a novel business tactic that pledges to delete data stolen by ransomware attackers, offering a dubious assurance to victims in exchange…