AI DevwWrld Chatbot Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Middle East Low Code No Code Summit TimeAI Summit

Last pills

Hackers trick Outlook by showing fake AV scansA sophisticated obfuscation technique tricks Outlook users with virus scanning scams

$17 million contract for Xage cybersecurity for Space Force networksA new milestone for cybersecurity: Xage partner of the Space Force

Launch of cybersecurity and IT apprenticeship program at University of Maine at AugustaA new approach to apprenticeships: smart investments for growth in IT and cybersecurity

Growing threat: Russian cyber warfare operations in UkraineThe increase in Russian attacks highlighted in the report of the Ukrainian cyber defense organization

Cyber threats

Ransomware Knight: the digital threat affecting ItalyThe serious threat that puts the security of Italian companies at risk: Ransomware Knight

The need to acquire new skills to deal with artificial intelligenceLabor market transformation in the context of generative AI: challenges and opportunities

VenomRAT malware spread via fake WinRAR PoCA dangerous exploit exploiting WinRAR RCE vulnerability spreads VenomRAT malware

New HTTPSnoop malware attacks telecom providersA new cyber attack threatens the security of telecom companies with the HTTPSnoop malware

Cyber ​​incidents

China's offensive cyber operations in Africa to support soft power effortsChina's growing threat: cyber infiltration into Africa to consolidate its digital dominance

China accuses the United States of a long campaign of cyber espionage against Huawei's serversRevealing investigation: details of cyber attacks against Huawei revealed by China's Ministry of State Security

Microsoft AI inadvertently exposed 38TB of sensitive data: lessons to be learnedThe consequences of data breaches and implications for corporate cybersecurity

Cyber espionage: Earth Lusca uses new Linux malwareA sophisticated cyber espionage attack endangers the security of Linux networks

Cyber ​​attack prevention

Apple fixes 3 more zero-day security issuesCritical updates to protect Apple users from zero-day attacks

Signal prepares for the era of quantum attacksThe race for secure encryption: Signal prepares for the challenges of the digital future

Data security: traditional data centers vs cloud environmentsData security: a comparative evaluation of traditional data centers and cloud environments

Zero Trust security: the importance of assigning the level of trust to corporate usersThe challenge of cybersecurity in the era of mobility and multi-device access

Cybersecurity legislation

Rohan Massey's role in the tech industryMassey's key role in cyber breach management and regulatory compliance in the technology sector

The Pentagon's 2023 strategy: enhance cybersecurity for allied countries and defend critical infr...The DoD's new strategy for enhancing cybersecurity and protecting critical infrastructure

What's new in the National Institute of Standards and Technology's brand new CMF frameworkNew updates and performance metrics in NIST's Cybersecurity Framework 2.0

The new Machinery Regulation and its importance in industrial cybersecurityThe impacts of the Machinery Regulation on the protection of company data and the management of IT risks

Cybersecurity events

CYSEC 2023: cyber security in an increasingly interconnected worldThe new challenges in data protection and the search for innovative solutions

Digital Identity & Authentication: a new approach to cybersecurityNew perspectives for data protection in the digital identity era

The digital war: cyber attacks from Russia threaten ItalyThe need for a strategic response: Italy and the emerging cyber front

Cybersecurity excellence Awards 2024: applications openThe prestigious opportunity to be recognized for excellence in cybersecurity