Microsoft has reported investigating the outage of multiple applications and services, including 365 and Azure. Learn more about the incident and its...
Researchers at Salt Security have found that manipulating the OAuth standard and cross-site scripting (XSS) flaws allows attackers to expose sensitive data and...
Threat actors have been exploiting a flaw in Proofpoint’s email protection service, impersonating popular brands as part of a phishing campaign. Learn...
Apple has released the first few features of Apple Intelligence as part of iOS 18.1, iPadOS 18.1, and macOS Sequoia developer beta. Discover what features are...
Social media platform X has turned on a setting that allows it to train Grok on user posts and interactions with the chatbot. Learn how you can opt out of this...
A grand jury in Kansas City has indicted Rim Jong Hyok, a North Korean intelligence operative who allegedly used ransomware to attack critical systems in the...
Insurers have estimated that the overall cost of CrowdStrike’s recent outage, caused by a faulty Falcon update, is billions of dollars. Learn more about...
Network admins use access control lists (ACLs) to define permissions associated with network traffic and control security and performance. In this article,...
OpenAI has introduced SearchGPT, an AI-powered search engine, while Microsoft has added AI features to its Bing search engine. Learn more about the development...
Mimecast, a human risk management platform and cybersecurity provider, has announced the acquisition of Code42, a company specializing in insider risk...
Cyber security researchers discovered risks in GitHub’s workflows and deleted data, in addition to the distribution of malware through accounts. Learn...
Google has redesigned Chrome to include malware detection in even password-protected executable files. Find out more about the development and why it matters...