News & UpdatesCybercriminals Share Millions of Stolen Records During Holiday Break rooter / January 4, 2024 The “Leaksmus” event on the Dark Web exposed some 50 million records containing sensitive information from people all around the world.
News & UpdatesGoogle Settles Lawsuit Over Tracking ‘Incognito Mode’ Chrome Users rooter / January 4, 2024 Google tracked privacy-conscious Internet users, and now it’s paying for it.
News & UpdatesCyberattackers Target Nuclear Waste Company via LinkedIn rooter / January 4, 2024 The hackers were unsuccessful in their attempt, but this is not the first time the company has experienced this kind of attack.
News & UpdatesIsrael Battles Spike in Wartime Hacktivist, OT Cyberattacks rooter / January 4, 2024 Israel’s cybersecurity industry made strides in the past year despite the backdrop of the war in Gaza.
News & UpdatesCISO Planning for 2024 May Struggle When It Comes to AI rooter / January 4, 2024 Artificial intelligence (AI) is constantly evolving. How can security executives plan for something so unpredictable?
News & UpdatesLocalization Mandates, AI Regs to Pose Major Data Challenges in 2024 rooter / January 4, 2024 With more than three-quarters of countries adopting some form of data localization and, soon, three-quarters of people worldwide protected by privacy rules, companies need to take care.
News & UpdatesAttackers Abuse Google OAuth Endpoint to Hijack User Sessions rooter / January 4, 2024 Infostealers such as Lumma and Rhadamanthys have integrated the generation of persistent Google cookies through token manipulation.
News & UpdatesStartups Scramble to Build Immediate AI Security rooter / January 4, 2024 AI may be inherently insecure, but only a handful of startups have put forward real visions to mitigate AI’s threats and keep data private.
News & Updates10 Years After Yahoo Breach, What’s Changed? (Not Much) rooter / January 4, 2024 Yahoo customers suffered the largest data breaches in history by some measures. But a decade on, experts warn, we still haven’t learned our lesson.
News & Updates‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections rooter / January 4, 2024 The Operation Triangulation attacks are abusing undocumented functions in Apple chips to circumvent hardware-based security measures.