AI and compliance: What are the risks?
The rapid growth of artificial intelligence (AI), especially generative AI (GenAI) and chatbots, gives businesses a wealth of opportunities to...
Read more →The rapid growth of artificial intelligence (AI), especially generative AI (GenAI) and chatbots, gives businesses a wealth of opportunities to...
Read more →Security flaws in CISA’s Known Exploited Vulnerabilities (KEV) catalog should be treated with urgency based on environmental context assessments, according...
Read more →Crooks use a fake antivirus site to spread Venom RAT and a mix of malware Pierluigi Paganini May 28, 2025...
Read more →CVSS stands for “Common Vulnerability Scoring System”. The CVSS framework is an open cyber security framework owned by a US-based...
Read more →The Chrome team at Google has officially released Chrome 137 to the stable channel for Windows, Mac, and Linux platforms....
Read more →ANY.RUN analysts recently uncovered a stealthy phishing campaign delivering the Remcos RAT (Remote Access Trojan) through a loader malware known...
Read more →A vulnerability in the smart contract for liquidity pools allowed hackers to steal roughly $223 million in virtual assets from...
Read more →MathWorks, the renowned developer of MATLAB and Simulink, has been grappling with the aftermath of a significant ransomware attack that...
Read more →It has long been recognised that central and local government departments, as well as the public sector more widely, face...
Read more →Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks Pierluigi Paganini May 28, 2025 Iranian man pleads guilty to...
Read more →On May 27, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a new Industrial Control Systems (ICS) advisory—ICSA-25-146-01—highlighting a...
Read more →Apple, in its latest App Store fraud analysis, revealed that the company prevented more than $2 billion in potentially fraudulent...
Read more →