Home

img

Australia Bans Kaspersky Software Over National Securit...

Australia has officially banned the installation of security software from Russian cybersecurity firm Kaspersky, citing potential ...

Apple Drops Advanced Data Protection in the UK Amid Gov...

Apple has abruptly discontinued its Advanced Data Protection (ADP) feature for iCloud in the United Kingdom following government d...

OpenAI Shuts Down Accounts Using ChatGPT for Surveillan...

OpenAI has taken action against a set of accounts that exploited its ChatGPT tool to develop an AI-powered surveillance system, re...

Salt Typhoon Cyberattack: Chinese Threat Actor Exploits...

Cisco has confirmed that a Chinese state-sponsored hacking group, Salt Typhoon, successfully infiltrated major U.S. telecommunicat...

Microsoft Exchange 2016 & 2019 Support Ends Soon: What ...

For years, Microsoft Exchange has been the foundation of corporate email, scheduling, and collaboration, enabling seamless communi...

PCI DSS 4.0 Mandates DMARC by March 2025: A Critical Mo...

The Payment Card Industry Data Security Standard (PCI DSS) v4.0 has introduced a significant compliance requirement: by March 31, ...

Microsoft Patches Critical Bing and Power Pages Vulnera...

Microsoft has issued security updates to address two Critical-rated vulnerabilities affecting Bing and Power Pages, including one ...

Australian Intelligence Warns of Rising Cyber Threats t...

Australia's national security agency, ASIO, has issued a stark warning about the growing risk of cyberattacks from foreign adversa...

Insight Partners Confirms Data Breach Following Sophist...

Insight Partners, a leading venture capital firm with investments in multiple cybersecurity companies, has disclosed a data breach...

Winnti Threat Group Targets Japanese Firms in New "Revi...

The China-affiliated cyber threat actor Winnti has been linked to a newly identified attack campaign, RevivalStone, which is speci...

New Xerox Printer Vulnerabilities Could Grant Attackers...

A widely used Xerox VersaLink business printer contained two now-patched security vulnerabilities that could have allowed attacker...

North Korean Hackers Refine Tactics in New "DEEP#DRIVE"...

North Korea-linked threat actors are increasingly leveraging living-off-the-land (LotL) techniques and trusted cloud services to e...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.