SGN pens IT service desk outsourcing deal
30
Jun
2023

SGN pens IT service desk outsourcing deal

SGN has swapped an IT managed service from Fujitsu with a five-year agreement with CGI as part of its plans…

Samsung vulnerabilities exploited
30
Jun
2023

Samsung Phone Flaws Added to CISA ‘Must Patch’ List Likely Exploited by Spyware Vendor

The US Cybersecurity and Infrastructure Security Agency (CISA) has added half a dozen flaws affecting Samsung smartphones to its Known…

SaaS Security
30
Jun
2023

3 Reasons SaaS Security is the Imperative First Step to Ensuring Secure AI Usage

Jun 30, 2023The Hacker NewsSaaS Security / Artificial Intelligence, In today’s fast-paced digital landscape, the widespread adoption of AI (Artificial…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
30
Jun
2023

MITRE Updates CWE Top 25 Most Dangerous Software Weaknesses

The MITRE Corporation has published an updated Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list to reflect…

University of Manchester Hack
30
Jun
2023

University of Manchester Hack – NHS patient Data Exposed

It has come to light that the University of Manchester fell victim to a Ransomware Hack, which resulted in the…

Apple, Google, and MOVEit Just Patched Serious Security Flaws
30
Jun
2023

Apple, Google, and MOVEit Just Patched Serious Security Flaws

Summer software updates are coming thick and fast, with Apple, Google, and Microsoft issuing multiple patches for serious security flaws…

NHS data stolen in Manchester Uni ransomware attack
30
Jun
2023

NHS data stolen in Manchester Uni ransomware attack

The cyber criminal organisation behind the developing ransomware attack on the University of Manchester appears to have accessed and stolen…

Hackers Can Use DNS TXT Records to Execute the Malware
30
Jun
2023

Hackers Can Use DNS TXT Records to Execute the Malware

DNS TXT record enables domain administrators to input text into DNS, initially for human-readable notes, but now it’s utilized for…

Proxyjacking Campaign
30
Jun
2023

Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign

Jun 30, 2023Ravie LakshmananServer Security / Cyber Threat An active financially motivated campaign is targeting vulnerable SSH servers to covertly…

What secure coding practices mean to modern cyber security
30
Jun
2023

The time to implement an internal AI usage policy is now

The use of artificial intelligence (AI) in organisations is increasingly widespread, thanks to its ability to increase efficiency, reduce the…

TSMC ransomware
30
Jun
2023

TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant

The LockBit ransomware group claims to have hacked Taiwan Semiconductor Manufacturing Company (TSMC), but the chip giant says only one…

WhatsApp
30
Jun
2023

WhatsApp Upgrades Proxy Feature Against Internet Shutdowns

Jun 30, 2023Ravie LakshmananPrivacy / Tech Meta’s WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in…