1,278 Results for:url

  • Sort by: 

Government agrees law to protect confidential journalistic material from state hacking

By Bill Goodwin 20 Feb 2024

The government will update Investigatory Powers Act to require secret intelligence agencies to seek independent approval before accessing confidential journalistic material obtained by bulk hacking, but journalists... Read More

ElevenLabs' funding success shows growth of AI voice market

By Esther Ajao 23 Jan 2024

The startup has quickly raised a total of $101 million, reflecting the fast growth of new technologies like deep neural networks. Along with growth comes challenges. Read More

5 common browser attacks and how to prevent them

By Ravi Das 29 Sep 2023

Browsers are critical components of any organization, especially with the rise of web apps. Security teams and users must, therefore, know how to avoid common browser attacks. Read More

Retail companies gain DORA metrics ROI from specialist tools

By Beth Pariseau 21 Jun 2023

DORA metrics and other measures of engineering efficiency are popping up in add-ons to existing DevOps tools. But third-party vendors added more value for Puma and Sensormatic. Read More

How to enable Internet Explorer mode on Microsoft Edge

By Robert Sheldon 09 Feb 2023

Internet Explorer mode lets users view legacy IE websites not supported by other browsers, which can increase productivity and improve security for IT administrators. Read More

How do cybercriminals steal credit card information?

21 Nov 2023

Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. Read More

Cozy Bear lures victims with used BMW 5 Series

By Alex Scroxton 12 Jul 2023

A recent Cozy Bear campaign saw the Russian APT group pivot to exploiting an advert for a used car as it targeted diplomatic missions in Kyiv Read More

LastPass faces mounting criticism over recent breach

By Alexander Culafi 18 Jan 2023

LastPass disclosed a breach last month in which a threat actor stole personal customer information, including billing addresses and encrypted website login details. Read More

CISA, NSA, FBI publish phishing guidance

By Alexander Culafi 19 Oct 2023

In its guidance, CISA focused on two primary goals of phishing attacks: obtaining login credentials, often via social engineering, and installing malware on target systems. Read More

Top.gg supply chain attack highlights subtle risks

By Alexander Culafi, Beth Pariseau 26 Mar 2024

Threat actors used fake Python infrastructure and cookie stealing to poison multiple GitHub code repositories, putting another spotlight on supply chain risks. Read More