Security

Microsoft Revamps Bonus Policy

Microsoft’s vice chair and president disclosed that cybersecurity awareness will shape top executives’ annual bonuses. This revelation comes before a US House committee hearing on...

Adobe’s AI Terms of Service Updates: Backlash and Concerns

Adobe has come under fire for recent updates to its Terms of Service concerning the company's AI products. The revised terms, impacting more than 20...

Defending Against AI-Driven Cyber Threats

Today, a cyberattack occurs approximately every 39 seconds. Cybercrime varies from phishing to ransomware, each with devastating results. In 2024, cybercrime is projected to cost...

Pharma Data Breach: Cencora Cyberattack Fallout

Several pharmaceutical firms, including major players, lost sensitive client data after a supply chain cyberattack originating from Cencora. In late February 2024, Cencora, formerly...

Ticketmaster Data Breach: Sensitive Info Compromised

Ticketmaster experienced a significant data breach, leading to the loss of sensitive information of many users. According to Hackread, ShinyHunters, a known group, posted...

US & Singapore Dismantle Largest Botnet | Admin Arrested

The US and Singapore governments dismantled "likely the world’s largest botnet ever" and arrested its admin. 911 S5 botnet hid cybercriminals' identities for various schemes. FBI...

“Nigerian Prince”: New Variant of Email Scam Emerges

A fresh twist on the famous "Nigerian prince" email scam is circulating, and it's proving to be quite effective. If you're not familiar, the "Nigerian...

Intego: New Cuckoo Malware Threat for macOS Users

Cybersecurity experts at Intego have identified new variants of the infamous Cuckoo malware targeting macOS users. For those unaware, Cuckoo is an info stealer that...

CVE-2023-52424: Wi-Fi Vulnerability Explained

Experts have found a method to trick devices into connecting to rogue Wi-Fi networks instead of trusted ones. This allows hackers to intercept network...

PlugX Malware: The Abandoned Yet Active Threat

Despite being abandoned by its creators, the PlugX malware continues to connect millions of devices, posing a significant cybersecurity risk.

Unstructured Data: A Double-Edged Sword

Unstructured data is growing explosively, presenting both opportunities and challenges for organizations. By 2025, Gartner predicts that 75% of enterprise data will be created...

True Anomaly’s Workforce Reduction

True Anomaly, a space and defense startup, has reduced its workforce by approximately 25%. The company has also cancelled its summer internship program. Company Statement A...