Introducing our new machine learning security principles
Introducing our new machine learning security principles Artificial intelligence (AI) and machine learning (ML) systems are increasingly used in every...
Introducing our new machine learning security principles Artificial intelligence (AI) and machine learning (ML) systems are increasingly used in every...
Securing the cloud (by design *and* by default) In any conversation about cloud security, it won’t take long before someone...
Supply chain cyber security: new guidance from the NCSC Many of us rely on suppliers to deliver products, systems, and...
Protect your customers to protect your brand We're pleased to publish a brace of documents that will help organisations to...
The security benefits of modern collaboration in the cloud When using cloud services, it is important to balance the need...
A popular British hacker was charged by the U.S. authorities for allegedly running the ‘The Real Deal’ dark web marketplace....
The OpenSSL Project announced an upcoming update to address a critical vulnerability in the open-source toolkit. The OpenSSL Project announced...
We found malicious samples attempting to steal Amazon Elastic Compute Cloud (EC2) Workloads' access keys and tokens via typosquatting and...
Ransomware attacks have been on the rise in recent years, and hospitals are increasingly becoming targets. In many cases, these...
International ticketing services company See Tickets disclosed a data breach that exposed customers’ payment card details. Ticketing service company See...
US authorities charged a Ukrainian man with computer fraud for allegedly infecting millions of computers with Raccoon Infostealer. The US...
Cisco warns of active exploitation attempts targeting two vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows. Cisco is...
VMware addressed a critical remote code execution vulnerability in VMware Cloud Foundation tracked as CVE-2021-39144. VMware has released security updates...
The ongoing shift of traditional IT functions to the cloud brings new cyber risks for enterprises. Discover three current cloud...
Our blog entry provides a look at an attack involving the LV ransomware on a Jordan-based company from an intrusion...
A high-severity vulnerability, tracked as CVE-2022-35737, has been disclosed in the SQLite database library. The security expert Andreas Kellas detailed...
Researchers reported that threat actors used 2 PoS malware variants to steal information about more than 167,000 credit cards. Cybersecurity...
The Hive ransomware gang, which claimed the responsibility for the Tata Power data breach, started leaking data. On October 14,...
A new malvertising campaign, code-named Dormant Colors, is delivering malicious Google Chrome extensions that hijack targets’ browsers. Researchers at Guardio...
Apple released security updates that addressed the ninth zero-day vulnerability actively exploited in the wild since the start of the...
Industry 4.0 has given rise to smart factories that have markedly improved machining processes, but it has also opened the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The Ukraine Computer Emergency Response Team (CERT-UA) warns of Cuba Ransomware attacks against critical networks in the country. The Ukraine...