Browsing Category
Cybersecurity
Microsoft AI Researchers Leak 38TB of Private Data
Microsoft accidentally revealed a huge trove of sensitive internal information dating back over three years via a public GitHub…
Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection
Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in…
Blockchain Technology: Strengthening Cybersecurity and Protecting Against…
By Thomas Carter, CEO, True I/O
In today’s digital landscape, the frequency and severity of password leaks and data breaches have…
Fraudsters Steal Over $1m in Three Weeks in ‘Pig Butchering’ Scam
Malicious actors have stolen more than $1m in a ‘pig butchering’ cryptocurrency scam in just three months, researchers from Sophos…
Another $40m Dispersed to Western Union Fraud Victims
A further multimillion-dollar distribution of funds from Western Union to victims of fraud perpetrated via its payment network has…
Illegal Betting Ring Used Satellite Tech to Get Scoop on Results
Police are celebrating after busting a suspected illegal betting and match-fixing ring which used advanced technology to find out…
TikTok Fined $368m For Child Data Privacy Offenses
TikTok has been fined hundreds of millions of dollars after Ireland’s data protection regulator found it infringed the GDPR with…
Adaptive DDoS Attacks Get More Sophisticated: How to Beat Attackers’ New…
By Gary Sockrider, Director, Security Solutions, NETSCOUT
The rapid expansion of Internet of Things (IoT) devices, which now…
Analyzing Four Diverse Attack Techniques Used by XeGroup
By Brett Raybould – EMEA Solutions Architect, Menlo Security
XeGroup is a prime example of the untold damage that sophisticated…
Cloud to Blame for Almost all Security Vulnerabilities
Four out of five (80.3%) security vulnerabilities observed in organizations across all sectors come from a cloud environment, Palo…