News

Operating in a country with strong national e-security can be an advantage for businesses, but it can't ensure their complete ...
The use of AI in business is creating an entirely new attack surface, Netwrix study claims Hackers are increasingly using AI in attacks AI used on company data generates intellectual property ...
Despite successful operations against ransomware gangs in 2024, ransomware was still the most pervasive threat to critical ...
How to Use Your Laptop’s Built-in Security Settings To Keep Data Safe: With cyber threats and data breaches becoming ...
At Google Cloud Next ’25 , Google and public sector leaders share latest on AI capabilities, uses and results.
For law firms and in-house teams alike, there are key takeaways from recent high-profile cyber security incidents impacting a ...
Conference unites leaders from government and industry to explore Kuwait’s ambitious cybersecurity transformation ...
Hackers stole personal juvenile case histories and sensitive documents from the Baltimore City state's attorney's office in ...
Severance is a cautionary tale of what happens when we try to eliminate cybersecurity threats without understanding people.
Another important application of GenAI in cyber offence is having it write code that exploits known vulnerabilities in the ...
Zero Trust isn't enough in 2025. Explore the next wave of cloud security with AI, XDR, decentralized identity, and adaptive ...
The Maharashtra Cyber Cell has warned users against uploading personal photos to AI apps generating Ghibli-style images. They caution that such platforms may collect and misuse sensitive biometric ...