European Commission moves to loosen GDPR for AI and cookie tracking
The European Commission is preparing sweeping revisions to the General Data Protection Regulation (GDPR) that could […]
Whisper Leak uses a side channel attack to eavesdrop on encrypted AI conversations
Researchers at Microsoft have revealed a new side channel attack named Whisper Leak that can reveal […]
Runtime bugs break container walls, enabling root on Docker hosts
Three newly disclosed high-severity bugs in the “runc” container runtime let attackers break out of containers […]
Researchers trick ChatGPT into prompt injecting itself
AI chatbots have opened a new frontier of attack vectors against users and their data, and […]
Why you should purple team your SOC
In my previous article — Your SOC is the parachute — I wrote about how many […]
CISOs must prove the business value of cyber — the right metrics can help
For most organizations, cybersecurity has always been seen as a cost center rather than a business […]
10 essenzielle Maßnahmen für physische Sicherheit
Wenn physische Security nur immer so simpel umzusetzen wäre… Foto: Leremy | shutterstock.com Obwohl CISOs im […]
India’s Largest Insurer Safeguards 30 Cr+ PII with CryptoBind
In a landmark achievement redefining digital trust in India’s financial ecosystem, JISA Softech has successfully implemented […]
Defending digital identity from computer-using agents (CUAs)
For years, organizations have relied on passwords and multi-factor authentication (MFA) based on shared secrets like […]
Vibe-coded ransomware proof-of-concept ended up on Microsoft’s marketplace
In a suspected test effort, unknown actors have successfully embedded a strain of ransomware-style behavior, dubbed […]