Trends and Predictions for 2024
Open source security refers to the practice of ensuring that open source software (OSS) is free from vulnerabilities that malicious actors could exploit. It involves…
Open source security refers to the practice of ensuring that open source software (OSS) is free from vulnerabilities that malicious actors could exploit. It involves…
Oct 24, 2023NewsroomZero Day / Mobile Security The TriangleDB implant used to target Apple iOS devices packs in at least four different modules to record…
How did the Okta Support breach impact 1Password? Pierluigi Paganini October 24, 2023 1Password detected suspicious activity on its Okta instance after the recent compromise…
This week on the Lock and Code podcast, we speak with James Fair about the reluctance of some businesses to take cybersecurity seriously, even in…
PII Belonging to Indian Citizens, Including their Aadhaar IDs, Offered for Sale on the Dark Web Pierluigi Paganini October 24, 2023 Hundreds of millions of…
Google plans to roll out its IP Protection feature for Chrome in phases. Google is working out some kinks in the project formerly known as…
Spain police dismantled a cybercriminal group who stole the data of 4 million individuals Pierluigi Paganini October 24, 2023 The Spanish police have arrested 34…
Facebook, the world’s leading social networking platform, has recently made headlines for all the wrong reasons. The company led by Mark Zuckerberg has found itself…
Oct 24, 2023NewsroomCyber Attack / Password Management Popular password management solution 1Password said it detected suspicious activity on its Okta instance on September 29 following…
By Manish Sinha, Founder & CTO, PatSeerProtecting intellectual property (IP) is key to encouraging human innovation across scientific, technical, and creative fields. Particularly in an…
AI has been the shiniest thing in tech since at least November 2022, when ChatGPT was made available to the masses and unveiled the transformative…
Wazuh is an open-source platform designed for threat detection, prevention, and response. It can safeguard workloads in on-premises, virtual, container, and cloud settings. Wazuh system…