News

AWS RE:INFORCE 2025 — Philadelphia — This week at its re:Inforce 2025 conference, Amazon Web Services unveiled a range of security enhancements to AWS Security Hub, AWS Shield and Amazon GuardDuty to ...
At least two journalists had their iOS devices compromised in recent months as a result of commercial spyware, according to research published this past week. The Citizen Lab, a research laboratory at ...
Financially troubled Indian car-sharing firm Zoomcar Holdings suffered a data breach last week, after "an unauthorized third ...
Private 5G connectivity promises transformative benefits for organizations that operate large physical sites, such as airports, factories, campuses, and ports. With high-capacity, low-latency ...
Cybercriminals continue to sneak malicious repositories onto GitHub. Typosquatting, dependency confusion, and other types of cyberattacks precipitated through malicious packages are old and common ...
Organizations in India want to adopt AI to modernize their approach to security operations, but are hampered by the need to deal with a quickly growing attack surface, a scarcity of workers with ...
As they trade missile strikes, Iran and Israel have also faced heavy waves of cyberattacks this past week. On June 13, Israel initiated a military offensive it called "Operation Rising Lion," aimed at ...
In today's interconnected world, data is more than just a resource — it's the foundation of modern business and society. And as its value has increased, so too have the efforts to compromise it. From ...
Although cybersecurity is the core of their role, chief information security officers (CISOs) must also be business leaders. They support business objectives and goals by providing the most secure ...
The threat associated with a critical decade-old remote code execution vulnerability in Roundcube webmail has increased sharply in recent days, with proof-of-concept (PoC) code for the bug becoming ...
When Israeli hackers deleted data from Iran's state-owned Bank Sepah, disrupting financial services, the act represented another escalation of the use of cyberattacks during geopolitical conflicts, ...
Google has fixed a security vulnerability in its page for recovering account details that allowed anyone to access the page and brute-force the private phone number of any user. The flaw posed a ...