Data Protection & Privacy

Microsoft Exchange Bug Blocks Legitimate Emails
Data Protection & Privacy Microsoft Exchange Bug Blocks Legitimate Emails

An essential tool for modern business communication is faltering as a significant bug within Microsoft's Exchange Online service has been incorrectly flagging and quarantining legitimate emails, causing widespread disruption for an unspecified number of customers. The issue, which began on February

Odido Data Breach Exposes Data of 6 Million Customers
Data Protection & Privacy Odido Data Breach Exposes Data of 6 Million Customers

Dutch mobile carrier Odido recently confirmed it was the target of a major cyberattack, resulting in a data breach that has compromised the personal information of more than 6 million customers across its primary brand and its subsidiary, Ben. The incident, which unfolded over a two-day period on

Hackers Are Weaponizing Google's Gemini AI
Data Protection & Privacy Hackers Are Weaponizing Google's Gemini AI

The same artificial intelligence designed to streamline daily life and innovate industries is now being quietly repurposed in the digital shadows to orchestrate sophisticated cyberattacks. Recent findings from Google's own threat intelligence teams have confirmed a troubling trend: state-sponsored

What Is Bitwarden's Cupid Vault for Secure Sharing?
Data Protection & Privacy What Is Bitwarden's Cupid Vault for Secure Sharing?

Sharing access to a joint bank account or the family streaming service has often forced individuals into a precarious digital dance, exchanging sensitive credentials through glaringly insecure channels. This common practice exposes critical information to interception and misuse, creating a

When Is a Windows Flaw Not a Vulnerability?
Data Protection & Privacy When Is a Windows Flaw Not a Vulnerability?

Today we’re speaking with Rupert Marais, our in-house security specialist, about a series of newly disclosed techniques that turn the humble Windows shortcut, or LNK file, into a surprisingly potent tool for cyberattacks. We'll be exploring the technical nuances of how these shortcuts can be

BeyondTrust Warns of Critical Flaw Allowing System Takeover
Data Protection & Privacy BeyondTrust Warns of Critical Flaw Allowing System Takeover

A single, maliciously crafted request sent across the internet could be all it takes for an attacker to seize complete control of an organization's most sensitive access management systems. This is the stark reality presented by a newly discovered vulnerability in BeyondTrust's core products, a

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later