AI DevwWrld Chatbot Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Middle East Low Code No Code Summit TimeAI Summit

Last pills

Signal prepares for the era of quantum attacksThe race for secure encryption: Signal prepares for the challenges of the digital future

Data security: traditional data centers vs cloud environmentsData security: a comparative evaluation of traditional data centers and cloud environments

VenomRAT malware spread via fake WinRAR PoCA dangerous exploit exploiting WinRAR RCE vulnerability spreads VenomRAT malware

China accuses the United States of a long campaign of cyber espionage against Huawei's serversRevealing investigation: details of cyber attacks against Huawei revealed by China's Ministry of State Security

Cyber threats

New HTTPSnoop malware attacks telecom providersA new cyber attack threatens the security of telecom companies with the HTTPSnoop malware

Cyber-mining danger: malicious package discovered on GitLabA seemingly innocuous Python library hides a persistent threat of unauthorized cryptocurrency mining

IT-Alert tests are arriving in Lombardy, Basilicata and Molise: possible risks of online scamsSecurity measures to adopt during IT-Alert tests: expert advice to protect your online privacy

Data Poisoning: a danger for Artificial IntelligencesMitigation strategies to protect neural networks from data poisoning threats

Cyber ​​incidents

Microsoft AI inadvertently exposed 38TB of sensitive data: lessons to be learnedThe consequences of data breaches and implications for corporate cybersecurity

Cyber espionage: Earth Lusca uses new Linux malwareA sophisticated cyber espionage attack endangers the security of Linux networks

ICC victim of serious cyber attack, investigations underwayThe ICC takes action to protect its digital integrity and ensure the operation of investigations

Clorox fights the consequences of a cyber attackCybersecurity challenges in the industrial sector: the impact of a cyber attack on Clorox

Cyber ​​attack prevention

Intel launches Project Amber to ensure the integrity of Trusted Execution EnvironmentsIntel's new integrity verification solution to ensure TEE security

Cyber attacks on the rise in Q2: the report from Swascan's SOC and Threat Intelligence TeamThe importance of an agile and aware defense against cyber threats

Trend Micro addresses a serious vulnerability that allows remote code executionTimely resolution of a serious vulnerability in Trend Micro's Apex One solution

Nearly 12,000 Juniper firewalls vulnerable to a recent RCE flaw discoveredA detailed analysis of the recent RCE vulnerability in Juniper firewalls and how it was exploited

Cybersecurity legislation

The Pentagon's 2023 strategy: enhance cybersecurity for allied countries and defend critical infr...The DoD's new strategy for enhancing cybersecurity and protecting critical infrastructure

What's new in the National Institute of Standards and Technology's brand new CMF frameworkNew updates and performance metrics in NIST's Cybersecurity Framework 2.0

The new Machinery Regulation and its importance in industrial cybersecurityThe impacts of the Machinery Regulation on the protection of company data and the management of IT risks

New England sees surge in cybersecurity and data privacy class action filingsRising legal complexities reflect a shift in cybersecurity litigation trends

Cybersecurity events

The digital war: cyber attacks from Russia threaten ItalyThe need for a strategic response: Italy and the emerging cyber front

Cybersecurity excellence Awards 2024: applications openThe prestigious opportunity to be recognized for excellence in cybersecurity

ISMG Cybersecurity Summit: an immersive experience in the Solution Room in LondonCyber security and leadership in the age of Artificial Intelligence: summit showcase in London

Washington summit addresses open source software securityMeetings between government and industry to protect computer systems from attacks on open source software