Governments Spying on Apple and Google Users, Says Senator
A senior US lawmaker has written to the attorney general requesting that the Department of Justice (DoJ) allows Apple and...
A senior US lawmaker has written to the attorney general requesting that the Department of Justice (DoJ) allows Apple and...
A Cambridge NHS trust has admitted two historic data breaches, stemming from the accidental disclosure of patient data in Excel...
Almost all (90%) of the world’s 48 biggest energy companies have suffered a supply chain data breach in the past...
A recent report has revealed that 40.2% of files stored on Google Drive contain sensitive data.The findings come from the...
In today's digital world, businesses are just as vulnerable to cyber-attacks as they are to fire and theft. New research...
The gorwing trend of finding CISOs personally liable for security failings is making security professionals more reluctant to take up...
Russian Intelligence Services have been engaging in a sustained cyber campaign aimed at interfering in UK politics and democratic processes. The...
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS...
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS...
OpenNDS has released security updates addressing a critical vulnerability (CVE-2023-41101) in their OpenNDS product, a service providing a border control...
A set of 21 newly discovered vulnerabilities impact Sierra OT/IoT routers and threaten critical infrastructure with remote code execution, unauthorized...
Japanese car maker Nissan is investigating a cyberattack that targeted its systems in Australia and New Zealand, which may have...
Athena AI, the new generative AI layer that spans across the entire Varonis Data Security Platform, redefines how security teams...
Austal USA, a shipbuilding company and a contractor for the U.S. Department of Defense (DoD) and the Department of Homeland...
Atlassian has published security advisories for four critical remote code execution (RCE) vulnerabilities impacting Confluence, Jira, and Bitbucket servers, along with...
Academic researchers developed a new side-channel attack called SLAM that exploits hardware features designed to improve security in upcoming CPUs...
A U.S. senator revealed today that government agencies worldwide demand mobile push notification records from Apple and Google users to...
A prolific Russian state-sponsored APT group is actively exploiting a known vulnerability in Outlook to access email accounts in Exchange...
Although US federal agencies have made progress in preparing for and responding to cyber threats, too many have failed to...
New legal requirements to check users’ ages before they can access pornography online could create serious security and privacy risks,...
A UK facility containing the world’s largest stockpile of civil plutonium has been breached by hackers linked to Russia and...
Security researchers have uncovered a surge in deceptive Android loan apps since the beginning of 2023. These applications, posing as legitimate...
Brand impersonation in cyber-attacks has reached new levels of sophistication, a recent research article by Abnormal Security has highlighted. Traditionally observed in...
Global law enforcers have arrested just over 1000 individuals suspected of money laundering, and identified thousands more, in a new...