
A Chinese-state advanced persistent threat (APT) actor tracked as Storm-0558 hacked into email accounts at multiple government agencies, and was able to lay low for over a month until being discovered and... Read more »

Although much of the initial panic surrounding the late-May breach of Progress Software’s MOVEit file transfer tool has subsided, Clop – the ransomware operation behind the attack – continues to leak victims’... Read more »
No matter what business your enterprise is in, developing a better, more complete relationship with your customers will always be beneficial to your bottom line. The cloud-based customer relationship management system offered... Read more »

With the launch of watsonx.ai and watsonx.data, the company is creating a platform approach to an AI workbench, allowing customers to deploy IBM, open-source or their own AI models. Image: MichaelVi/Adobe Stock... Read more »

The Russian intelligence-backed advanced persistent threat (APT) group known variously as APT29, Nobelium or Cozy Bear, arguably most famous for the 2020/1 SolarWinds incident, has been caught trying to ensnare diplomats working in... Read more »

A whistleblower is contacting NatWest customers affected by a data breach which has forced her to store the sensitive information of around 1,600 of the bank’s customers in her home for over... Read more »

Artificial intelligence (AI) doesn’t stand a chance of being able to replicate the human creativity needed to become an ethical hacker, but it will disrupt how hackers conduct penetration testing and work... Read more »

Microsoft has disclosed a potentially serious remote code execution (RCE) zero-day under active exploitation – by a group with alleged links to the Russian intelligence services – among more than 100 other... Read more »

Cyber fraudsters and scammers are already attempting to exploit last week’s launch of Meta’s latest social media venture, a “Twitter-killer” called Threads, to conduct phishing attacks and distribute malwares, according to analysis... Read more »

Apple has deployed a patch under its new Rapid Security Response (RSR) update programme for the second time, addressing a potentially dangerous zero-day in iOS for iPhone, iPadOS for iPad, macOS Ventura... Read more »