Brush fires have forced the evacuation of more than 1,500 people in southwest China. Source
Authorities have reported that hundreds of Taiwanese are among the untold numbers of captives who are being detained against their will and made to labour in telecom fraud networks by….
The cost of a data breach is not easy to define, but as more and more organizations fall victim to attacks and exposures, the financial repercussions are becoming clearer. Source
The next decade will be a turning point in the global cyber arms race. And the stakes are very high. If measured as a country's GDP, cyber crime would now….
Despite being a known and well-documented vulnerability, web cache poisoning continues to crop up around the web. In extensive research of many websites, including some high-traffic online services, security researcher….
Cybersecurity researchers demonstrate how to use electromagnetic field emanations from IoT devices to detect malware. A team of academics (Duy-Phuc Pham, Damien Marion, Matthieu Mastio and Annelie Heuser) from the….
Threat actors continue to attempt to exploit Apache Log4J vulnerabilities in their campaigns to deploy malware on target systems, Microsoft warns. Microsoft is warning of continuing attempts by nation-state actors….
The US Federal Trade Commission (FTC) has warned legal action against companies who fail to secure their infrastructure against attacks. The US Federal Trade Commission (FTC) warns legal action against….