Browsing Category
Cybersecurity
Drugs and Cybercrime Market Busted By German Cops
German police claim to have disrupted the country’s most popular underground market for drugs and cybercrime.
Düsseldorf police…
Generative Ai: The Future of Cloud Security
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation
Generative AI: The Future of…
What’s The Role of Gaslighting in The Cyber Security Context of Social…
By Anna Drescher, Freelance Writer and Mental Health Specialist
A few years ago, I received an email from Apple stating that…
Biden Warns Chinese Cars Could Steal US Citizens’ Data
US President Joe Biden has warned that Chinese manufactured automobiles could be used to steal sensitive data of US citizens and…
Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s…
By Ron Konezny, President & CEO, Digi International
The most cybersecurity-savvy members of an organization are typically not…
Five Eyes Warn of Ivanti Vulnerabilities Exploitation
Read more on Ivanti vulnerabilities:
Eight government agencies from the Five Eyes countries (Australia, Canada, New Zealand,…
UK Home Office Breached Data Protection Law with Migrant Tracking
The UK Home Office has breached data protection law by using electronic tags to monitor migrants, according to the Information…
Pharma Giant Cencora Reports Cybersecurity Breach
Leading drug distributor Cencora has disclosed a cybersecurity incident where data from its information systems was compromised,…
Savvy Seahorse Targets Investment Platforms With DNS Scams
DNS threat actors operating under the moniker Savvy Seahorse have been observed employing sophisticated tactics to lure victims…
Wireless Peripheral Devices – Security Risk, Exploits and Remediation
This article covers the importance of Wireless Peripheral Device Security, the risks involved, and ways to remediate the security…