HomeSecurity

Security

Predictions 2024 from cybersecurity vendors, Part 2

We’ve collected comments from more than 40 vendors to give infosec pros an idea of what they might face in the next 12 months....

Predictions 2024 from cybersecurity vendors, Part 1

2024 will be a year dominated by artificial intelligence-created deepfakes and advanced phishing attacks, but also new AI-based detection applications to help defenders. These are...

AlphV/BlackCat allegedly calls for ransomware gang ‘cartel’ to stand up to police

Seemingly stunned by this week’s action by law enforcement agencies in several countries,  members of two ransomware groups allegedly talked about forming a partnership. Security...

Two Lapsus$ gang members sentenced in U.K.

One of two British teens in the Lapsus$ hacking gang has been sent to a secure hospital indefinitely by a judge, while another was...

Scraped images of sexually abused children found in AI training database

Thousands of images of sexually abused children scraped from the internet are part of a commonly-used database used to train artificial intelligence image generators,...

Threat actors still exploiting old unpatched vulnerabilities, says Cisco

The exploitation of a vulnerability in Progress Software’s MOVEit file transfer application was one of the biggest cybersecurity news headlines of the year. However, according...

U.S. drug store chain banned from using facial recognition for five years

Rite Aid, an American drug store chain, will be banned by a regulator from using facial recognition applications to identify suspicious customers for five...

AlphV/BlackCat ransomware gang’s websites seized, FBI releases decrypter

U.S. authorities have confirmed the disruption of the AlphV/BlackCat ransomware gang, including the seizure of several of the group’s data leak and communications sites...

Southern Ontario school board acknowledges ‘cyber incident’

One of the biggest public school boards in Southern Ontario has publicly acknowledged a cyber attack, over a month after it was detected. The York...

Dental benefits group notifying almost 7 million Americans of MOVEit data theft

Almost 7 million U.S. residents are being notified by a dental benefits provider that their personal information was stolen in one of the biggest...

Hackers abusing OAuth to automate cyber attacks, says Microsoft

Threat actors are misusing OAuth-based applications as an automation tool for authentication, says Microsoft. “Threat actors compromise user accounts to create, modify, and grant high...

BlackBerry names new CEO, will split cybersecurity and IoT businesses

BlackBerry’s new leader is the former head of its cybersecurity business unit. The Waterloo, Ont., company said this morning that John Giamatteo is its new...

European political agreement paves the way for AI law

The European Union has reached agreement on the world’s first comprehensive artificial intelligence law. According to the Associated Press, negotiators from the European Parliament and...

Canadian mid-sized firms pay an average $1.13 million to ransomware gangs

The average ransomware payment made by mid-sized Canadian companies this year was just over $1 million, according to a new survey. The survey of IT...

Canadian privacy czars release principles for responsible development of AI

On the heels of cybersecurity guidance for generative AI systems issued by the federal government, Canada’s federal, provincial, and territorial privacy regulators have issued...

Popular Posts

Security Blogs

Slideshows

How to equip students with the tools to succeed

Many teams used to spend the entire summer updating student devices. But now the Windows 10 ability to manage the devices without having to...

Stay cyber-safe this holiday season

The holidays are a busy time of year, packed with family gatherings, festive parties and hours spent lining up in crowded stores to buy...

How upgrading your network can deliver a competitive advantage

In 2014, Gartner reported that the average cost of network downtime to an enterprise was $5,600 per minute. And even if the network isn't...

The top three network security challenges for 2016

Securing the network has always been a challenge, but it’s only getting more complex, thanks to the rise of cloud applications, programmable networks and...