FCC orders telecom carriers to report PII data breaches within 30 days
Starting March 13th, telecommunications companies must report data breaches impacting customers' personally identifiable information within 30 days, as required by…
Starting March 13th, telecommunications companies must report data breaches impacting customers' personally identifiable information within 30 days, as required by…
Microsoft warned Outlook for Microsoft 365 users that clients might have issues connecting to email servers via Exchange ActiveSync after…
Google has launched a new pilot program to fight financial fraud by blocking the sideloading of Android APK files that…
A widely reported story that 3 million electric toothbrushes were hacked with malware to conduct distributed denial of service (DDoS)…
If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure…
A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the…
As the Middle East nation enforces strict cybercrime laws, citizens face crackdowns on free speech with nearly three dozen journalists…
The attack, associated with Shuckworm, employs TTPs observed in prior campaigns against the Ukrainian military, predominantly using PowerShell.
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is…
By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it…