Take a break and read all about it
Source code from exposed repositories of dozens of companies across various sectors (tech, finance, retail, food, eCommerce, manufacturing) is publicly available, because of misconfigurations in
The ‘mastermind’ of the Twitter breach that utilised prominent peoples accounts for a cryptocurrency con turned out to be a 17-year-old in Tampa, Florida, who
A “BootHole” bug could let cyber-attackers load malware, steal information & move laterally into corporate, OT, IoT & home networks. Billions of Windows & Linux
The FBI warned organisations last week that attackers are increasingly using built-in network protocols to launch destructive distributed denial of service attacks. For many, the
The 2 hackers were also linked to attempts to hack American biotech firms working on a Coronavirus (COVID-19) vaccine. The US govt. recently laid charges
Algorithms revealed error rates of between 5%-50% when comparing photos of people wearing digitally created masks with unmasked faces. Face masks not only have shown
CISOs should do more to ensure staff do not burn-out – including increasing diversity. Over half (54%) of IT security professionals had left a job
It has now been established that a ‘path traversal vulnerability’ in the iDRAC technology can allow remote attackers to take over control of server operations.
It has been revealed that hackers are exploiting a ‘high-severity vulnerability’ found in Cisco’s network security software products, often used by US Fortune 500 companies.
The UK’s initiative to trace contacts of people infected with Covid-19 is receiving criticism, as privacy campaigners maintain that it was rolled-out without a proper