Apple and Microsoft challenge regulatory scope of EU’s Digital Markets Act
Apple and Microsoft are attempting to circumvent the European Union’s Digital Markets Act (DMA) by arguing that neither...
New BLISTER Malware Update Fuelling Stealthy Network Infiltration
An updated version of a malware loader known as BLISTER is being used as part of SocGholish infection...
Is that a Chromebook killer in your pocket, Tim Cook?
“An iPad, a Mac, a personal productivity device, an iPad, a Mac, a personal productivity device, can you...
New Python Variant of Chaes Malware Targets Banking and Logistics Industries
Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes. “It has...
Understanding Stablecoin Technology and Related Security Considerations: NIST Publishes IR 8408
NIST has published Internal Report (IR) 8408, Understanding Stablecoin Technology and Related Security Considerations . Stablecoins are a...
Spotlight: The Challenge to Detect Stealthy Attacks Against AI Data
What if someone were to manipulate the data used to train AI? NIST is collaborating on a competition...
Way Too Vulnerable: Join this Webinar to Understand and Strengthen Identity Attack Surface
In today’s digital age, it’s not just about being online but how securely your organization operates online. Regardless...
Baidu CEO’s remarks put LLMs in focus as US-China trade war escalates
Baidu CEO Robin Li on Tuesday said Chinese institutions and technology companies have released over 70 large language...
TikTok opens Dublin data centre to ease China spying fears
There is concern over the video-sharing app’s links with China and who accesses its users’ data. Source:: BBC...
Key Cybersecurity Tools That Can Mitigate the Cost of a Breach
IBM’s 2023 installment of their annual “Cost of a Breach” report has thrown up some interesting trends. Of...
EE and Vodafone customers able to call after bug fixed
The two providers have offered different accounts of what happened to their networks. Source:: BBC News – Technology
Researchers Warn of Cyber Weapons Used by Lazarus Group’s Andariel Cluster
The North Korean threat actor known as Andariel has been observed employing an arsenal of malicious tools in its cyber...
GenAI in productivity apps: What could possibly go wrong?
We’re in the “iPhone moment” for generative AI, with every company rushing to figure out its strategy for...
Meta Takes Down Thousands of Accounts Involved in Disinformation Ops from China and Russia
Meta has disclosed that it disrupted two of the largest known covert influence operations in the world from...
Long wave radio fans mourn fading frequencies
Now disappearing, long wave radio broadcasts once gave a taste of far flung countries and cultures. Source:: BBC...
Electoral Commission failed basic security test before hack
Whistleblower tells the BBC the election watchdog failed the government-backed Cyber Essentials test. Source:: BBC News – Technology
A college student’s guide to dating app scams
For all the conveniences they provide, dating apps can be a headache. Not only do you have to...
UK government outlines five objectives for AI Safety Summit
The UK government has laid out its five ambitions for the upcoming AI Safety Summit, due to be...
Hackers Exploit MinIO Storage System Vulnerabilities to Compromise Servers
An unknown threat actor has been observed weaponizing high-severity security flaws in the MinIO high-performance object storage system...
New iPhone, new charger: Apple bends to EU rules
A European Union law will require portable devices to have a common charger by 2024. Source:: BBC News...