1,278 Results for:url
- Sort by:
Government agrees law to protect confidential journalistic material from state hacking
20 Feb 2024The government will update Investigatory Powers Act to require secret intelligence agencies to seek independent approval before accessing confidential journalistic material obtained by bulk hacking, but journalists... Read More
ElevenLabs' funding success shows growth of AI voice market
23 Jan 2024The startup has quickly raised a total of $101 million, reflecting the fast growth of new technologies like deep neural networks. Along with growth comes challenges. Read More
5 common browser attacks and how to prevent them
29 Sep 2023Browsers are critical components of any organization, especially with the rise of web apps. Security teams and users must, therefore, know how to avoid common browser attacks. Read More
Retail companies gain DORA metrics ROI from specialist tools
21 Jun 2023DORA metrics and other measures of engineering efficiency are popping up in add-ons to existing DevOps tools. But third-party vendors added more value for Puma and Sensormatic. Read More
How to enable Internet Explorer mode on Microsoft Edge
09 Feb 2023Internet Explorer mode lets users view legacy IE websites not supported by other browsers, which can increase productivity and improve security for IT administrators. Read More
How do cybercriminals steal credit card information?
21 Nov 2023Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. Read More
Cozy Bear lures victims with used BMW 5 Series
12 Jul 2023A recent Cozy Bear campaign saw the Russian APT group pivot to exploiting an advert for a used car as it targeted diplomatic missions in Kyiv Read More
LastPass faces mounting criticism over recent breach
18 Jan 2023LastPass disclosed a breach last month in which a threat actor stole personal customer information, including billing addresses and encrypted website login details. Read More
CISA, NSA, FBI publish phishing guidance
19 Oct 2023In its guidance, CISA focused on two primary goals of phishing attacks: obtaining login credentials, often via social engineering, and installing malware on target systems. Read More
Top.gg supply chain attack highlights subtle risks
26 Mar 2024Threat actors used fake Python infrastructure and cookie stealing to poison multiple GitHub code repositories, putting another spotlight on supply chain risks. Read More