Internet Security

Apple Launches $1 Million Bug Bounty for Hacking AI-Focused Servers
Infrastructure & Network Security Apple Launches $1 Million Bug Bounty for Hacking AI-Focused Servers

Apple has announced a groundbreaking initiative to encourage the security community to identify and address vulnerabilities in its new AI-focused servers, named Private Cloud Compute (PCC). With a maximum reward of $1 million, this bug bounty program aims to fortify the security measures of PCC,

How Did Game Freak's Data Breach Expose Nintendo's Secrets?
Data Protection & Privacy How Did Game Freak's Data Breach Expose Nintendo's Secrets?

In August 2024, a shocking data breach shook the gaming world, impacting Game Freak, the developer behind the beloved Pokémon series. The breach was officially confirmed in October 2024, revealing the exposure of sensitive employee records and proprietary business information from its partner,

Emerging Cloud Phishing Tactics Exploiting APIs and SaaS Solutions
Infrastructure & Network Security Emerging Cloud Phishing Tactics Exploiting APIs and SaaS Solutions

Between December 2023 and September 2024, cybersecurity analysts from ReliaQuest identified a concerning trend in the tactics, techniques, and procedures (TTPs) used by cyber attackers to exploit cloud environments. Based on the analysis of true-positive alerts from customer environments, the

Qualys VMDR: Only Solution Rated as Both Outperformer and Leader
Infrastructure & Network Security Qualys VMDR: Only Solution Rated as Both Outperformer and Leader

In a recent evaluation by an independent analyst firm, Qualys VMDR (Vulnerability Management, Detection, and Response) has not only garnered attention but has also secured an impressive dual rating of "Outperformer" and "Leader," setting it apart from its competitors. This

Apple Launches Bug Bounty for Private Cloud Compute Security Testing
Infrastructure & Network Security Apple Launches Bug Bounty for Private Cloud Compute Security Testing

Apple is set to launch its new Private Cloud Compute service, which builds upon its existing on-device AI model known as Apple Intelligence to enable more intensive AI tasks while ensuring user privacy. As part of this significant rollout, Apple is making substantial financial rewards available

How Are ASU Scientists Shaping the Future of Cybersecurity?
Infrastructure & Network Security How Are ASU Scientists Shaping the Future of Cybersecurity?

The rapid integration of technology in our daily lives has ushered in a new era of cybersecurity challenges. In response, a trio of researchers from Arizona State University’s Global Security Initiative's Center for Cybersecurity and Trusted Foundations is pioneering innovative approaches to p

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later