Internet Security

Cyberattackers Use Fake Google Meet Errors in Sophisticated Malware Scam
Infrastructure & Network Security Cyberattackers Use Fake Google Meet Errors in Sophisticated Malware Scam

In a recent turn of events, cyberattackers have begun utilizing fake Google Meet error messages as part of an elaborate social engineering campaign known as ClickFix. This campaign aims to disseminate info-stealing malware by banking on users' trust in widely-used platforms like Google Meet.

How Can Tenable's New Tools Improve Your Cloud and AI Security?
Data Protection & Privacy How Can Tenable's New Tools Improve Your Cloud and AI Security?

Tenable has made a significant leap in the realm of cloud and AI security with the introduction of its Data Security Posture Management (DSPM) and Artificial Intelligence Security Posture Management (AI-SPM) capabilities. These additions to the Tenable Cloud Security platform are designed to

Is Cisco Facing a Major Data Breach from Notorious IntelBroker Group?
Data Protection & Privacy Is Cisco Facing a Major Data Breach from Notorious IntelBroker Group?

Cisco, the networking giant, is navigating turbulent waters as it finds itself at the center of a potentially massive data breach. The incident has cast a spotlight on the notorious extortionist group IntelBroker, an assembly of cybercriminals operating under BreachForums. Allegedly orchestrating

Can Decentralized Systems Solve Biometric Data Privacy Issues?
Data Protection & Privacy Can Decentralized Systems Solve Biometric Data Privacy Issues?

In a landscape riddled with privacy breaches and data security threats, the centralized storage of biometric data presents complex challenges that are increasingly difficult to manage. Evin McMullen, co-founder of Privado ID, has been actively advocating for a decentralized approach to managing

How Can You Keep Your Mobile Device Secure While Browsing Online?
Data Protection & Privacy How Can You Keep Your Mobile Device Secure While Browsing Online?

In today's digital age, our mobile devices have become an indispensable part of our lives, serving as crucial tools for communication, entertainment, work, and more. However, with this increased reliance comes the challenge of ensuring our mobile data remains secure. According to experts, the

Will China's Security Review of Intel Impact U.S.-China Tech Relations?
Infrastructure & Network Security Will China's Security Review of Intel Impact U.S.-China Tech Relations?

The Cybersecurity Association of China (CSAC) has called for a comprehensive security review of Intel products sold within the Chinese market, citing concerns over national security and the interests of Chinese consumers. Despite being an industry group rather than a governmental body, CSAC

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later