Google alert failed to warn people of Turkey earthquake
The tech giant claims millions of people were sent a warning before the deadly earthquake earlier this year....
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ACLs Not Installed upon Reload
An issue with the boot-time programming of access control lists (ACLs) for Cisco Adaptive Security Appliance (ASA) Software...
Access and Query are now generally available for Amazon Managed Blockchain
Today, AWS announces the general availability of Amazon Managed Blockchain (AMB) Access and AMB Query. These two services...
GameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Users
Cybersecurity researchers have disclosed two high-severity security flaws in the Ubuntu kernel that could pave the way for...
New Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search Ads
A new malvertising campaign has been observed leveraging ads on Google Search and Bing to target users seeking...
Apple (un)officially calls ‘Action’ on iPhone 15 rumor season
Apple appears to have slipped in hints of a new feature in the latest beta of iOS 17...
Final Reminder! Comment on Proposed Competency Areas
We want to hear from you! Final reminder to submit comments! Last month, NICE released a new proposed...
NIST Requests Public Comments on SP 800-135 Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines. Currently,...
NIST Requests Public Comments on FIPS 202, “SHA-3 Standard,” and SP 800-185, “SHA-3 Derived Functions”
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines. Currently,...
The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left
As cloud applications are built, tested and updated, they wind their way through an ever-complex series of different...
Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Mining
Misconfigured and poorly secured Apache Tomcat servers are being targeted as part of a new campaign designed to...
Group-IB Co-Founder Sentenced to 14 Years in Russian Prison for Alleged High Treason
A city court in Moscow on Wednesday convicted Group-IB co-founder and CEO Ilya Sachkov of “high treason” and...
APT trends report Q2 2023
For more than six years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly...
Is generative AI mightier than the law?
Generative AI, led by Microsoft and Microsoft-backed OpenAI, has turned into what seems an unstoppable juggernaut. Since OpenAI...
Artificial Intelligence police van detects drivers using mobile phones
The van found 86 drivers suspected of using a phone and 273 people not wearing a seat belt....
New SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 Days
The U.S. Securities and Exchange Commission (SEC) on Wednesday approved new rules that require publicly traded companies to...
Hollywood writers fear losing work to AI
US movie and TV writers have been on strike since May with artificial intelligence a core issue. Source::...
Spotlight on shadow IT
New guidance to help organisations manage rogue devices and services within the enterprise. Source:: NCSC Guidance
Shadow IT
Managing ‘unknown assets’ that are used within an organisation. Source:: NCSC Guidance
E-bike battery fires spark call to regulate like fireworks
A charity says batteries for e-bikes should require third-party approval before being sold in the UK. Source:: BBC...