
How to establish an effective AI GRC framework
Enterprise use of artificial intelligence comes with a wide range of risks in areas such as […]

Hacker stehlen BVG-Kundendaten
Kunden der Berliner Verkehrsbetriebe (BVG) sind von einer Datenpanne betroffen. Media centre BVG Die Berliner Verkehrsbetriebe […]

Proofpoint buying Hornetsecurity in a play to expand email security scope
More than of 90% of successful cyberattacks begin with emails, according to the US Cybersecurity and […]

After helping Russia on the ground North Korea targets Ukraine with cyberespionage
North Korea’s involvement in the war in Ukraine extends beyond sending soldiers, munitions, and missiles to […]
Google patches Chrome vulnerability used for account takeover and MFA bypass
Chrome users are advised to update their browser immediately to fix a critical vulnerability that is […]
Risks and Mitigation of Malware Explained: Top 5 Strategies
Malware—short for malicious software and malicious programs—is one of the most dangerous cybersecurity threats today. From […]

Stealth RAT uses a PowerShell loader for fileless attacks
>Threat actors have been spotted using a PowerShell-based shellcode loader to stealthily deploy Remcos RAT, a […]

Alternatives to Microsoft Outlook webmail come under attack in Europe
CISOs need to ensure that web email clients and browsers are kept up to date following […]

Data on sale: Trump administration withdraws data broker oversight proposal
The US Consumer Financial Protection Bureau has withdrawn a proposed rule that would have restricted data […]

The most effective phishing QR code is a new drug and alcohol policy supposedly from HR
Phishing emails that appear to be internal and come from the IT or HR department are […]