Data Privacy & Security

FBI Seizes BreachForums in Salesforce Extortion Crackdown
Data Protection & Privacy FBI Seizes BreachForums in Salesforce Extortion Crackdown

In a striking move against cybercrime, federal authorities have once again targeted one of the most notorious underground forums, marking a significant chapter in the ongoing battle against digital extortion. The FBI, in collaboration with French law enforcement, has seized the latest version of

Can UK GDPR Hold Foreign Tech Firms Like Clearview AI Accountable?
Security Operations & Management Can UK GDPR Hold Foreign Tech Firms Like Clearview AI Accountable?

In the ever-evolving landscape of data privacy, few cases have sparked as much debate as the ongoing legal battle between Clearview AI and the UK’s Information Commissioner’s Office (ICO). Today, we’re joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and

Google Unveils Gemini Enterprise to Transform Workplace AI
Data Protection & Privacy Google Unveils Gemini Enterprise to Transform Workplace AI

Imagine a workplace where every employee, from entry-level staff to top executives, has a personal AI assistant streamlining complex tasks in seconds, slashing operational costs, and driving unprecedented productivity. This is no longer a distant vision but a tangible reality with Google Cloud's

How Did Medusa Ransomware Exploit Fortra's Critical Flaw?
Endpoint & Device Security How Did Medusa Ransomware Exploit Fortra's Critical Flaw?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with extensive expertise in endpoint and device security, cybersecurity strategies, and network management. With the recent surge in ransomware attacks targeting critical software vulnerabilities, particularly the

Chinese Cybercrime Group UAT-8099 Targets Global IIS Servers
Data Protection & Privacy Chinese Cybercrime Group UAT-8099 Targets Global IIS Servers

What if the very servers powering trusted websites were turned into tools for deception and theft? In a startling discovery this year, cybersecurity experts have exposed a Chinese-speaking cybercrime group, codenamed UAT-8099, orchestrating a massive operation against Microsoft Internet Information

How Can Foreign Dual-Use Tech Firms Navigate U.S. Security?
Data Protection & Privacy How Can Foreign Dual-Use Tech Firms Navigate U.S. Security?

Fixed version: In an era where technology shapes both civilian life and military capabilities, foreign dual-use tech firms face a complex landscape when seeking to enter the U.S. market, a hub of innovation and opportunity intertwined with stringent national security concerns. Dual-use

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later