21 Feb

Europe’s data protection laws cut data storage by making information-wrangling pricier

Europe’s General Data Protection Regulation (GDPR) has led European firms to store and process less data, recent economic research suggests, because the privacy rules are

Author rabih
21 Feb

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

ESET products and research have been protecting Ukrainian IT infrastructure for years. Since the start of the war in February 2022, we have prevented and

Author rabih
21 Feb

China could be doing better at censorship, think tank finds

China’s censorship regime remains pervasive and far reaching, but the bureaucratic apparatus implementing it is unevenly developed and is not always well funded, according to

Author rabih
21 Feb

Singapore’s monetary authority advises banks to get busy protecting against quantum decryption

The Monetary Authority of Singapore (MAS) advised on Monday that financial institutions need to stay agile enough to adopt post-quantum cryptography (PQC) and quantum key

Author rabih
20 Feb

Cops turn LockBit ransomware gang’s countdown timers against them

In seizing and dismantling LockBit’s infrastructure, Western authorities are now making a mockery of the ransomware criminals by promising a long, drawn-out disclosure of its

Author rabih
20 Feb

Wyze admits 13,000 users could have viewed strangers’ camera feeds

Smart home security camera slinger Wyze is telling customers that a cybersecurity “incident” allowed thousands of users to see other people’s camera feeds. Thanks to

Author rabih
20 Feb

Insider steals 79,000 email addresses at work to promote own business

A former council staff member in the district where William Shakespeare was born ransacked databases filled with residents’ information to help drum up new business

Author rabih
20 Feb

Watching out for the fakes: How to spot online disinformation

How To Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes? Márk Szabó 20

Author rabih
20 Feb

Two days into the Digital Services Act, EU wields it to deepen TikTok probe

Two days after its Digital Services Act (DSA) came into effect, the European Union used it to open an investigation into made-in-China social network TikTok.

Author rabih
20 Feb

Vietnam to collect biometrics – even DNA – for new ID cards

The Vietnamese government will begin collecting biometric information from its citizens for identification purposes beginning in July this year. Prime minister Pham Minh Chinh instructed

Author rabih
20 Feb

LockBit ransomware gang disrupted by global operation

Notorious ransomware gang LockBit’s website has been taken over by law enforcement authorities, who claim they have disrupted the group’s operations and will soon reveal

Author rabih
19 Feb

ALPHV gang claims it’s the attacker that broke into Prudential Financial, LoanDepot

The ALPHV/BlackCat ransomware group is claiming responsibility for attacks on both Prudential Financial and LoanDepot, making a series of follow-on allegations against them. Both US

Author rabih
19 Feb

Safeguarding cyber-physical systems for a smart future

Sponsored Feature Cyber-physical systems (CPS) have a vital role to play in our increasingly connected world. They are already providing the link that integrates compute

Author rabih
19 Feb

Feds post $15 million bounty for info on ALPHV/Blackcat ransomware crew

infosec in brief The US government is offering bounties up to $15 million as a reward for anyone willing to help it take out the

Author rabih
18 Feb

Election security threats in 2024 range from AI to … anthrax?

In time for the long Presidents’ Day weekend in the US there have been multiple warnings about what will undoubtedly be a challenging and potentially

Author rabih
17 Feb

How to weaponize LLMs to auto-hijack websites

AI models, the subject of ongoing safety concerns about harmful and biased output, pose a risk beyond content emission. When wedded with tools that enable

Author rabih
17 Feb

Google open sources file-identifying Magika AI for malware hunters and others

Google has open sourced Magika, an in-house machine-learning-powered file identifier, as part of its AI Cyber Defense Initiative, which aims to give IT network defenders

Author rabih
16 Feb

Zeus, IcedID malware kingpin faces 40 years in slammer

A Ukrainian cybercrime kingpin who ran some of the most pervasive malware operations faces 40 years in prison after spending nearly a decade on the

Author rabih
Load moreLoadingAll items loaded