HomeSecurity

Security

Top Women in Cybersecurity keynote: A cybersecurity career is harder than ChatGPT paints it — but just as rewarding

ChatGPT is good for a lot of things, but don’t ask it to create a realistic scenario for a woman who wants a career...

Google, Microsoft form group to create best practices for emerging AI models

Another industry group has emerged promising to promote best practices for artificial intelligence applications at a time when governments around the world are looking...

First Canadian class action suit filed in GoAnywhere MFT hacks

Several proposed class action lawsuits have been filed in the U.S. stemming from the exploitation and data thefts in January from a vulnerability in...

IT coalition promises to improve patching, network visibility

Some of the biggest names in IT and service providers including AT&T, Cisco Systems, Fortinet, VMware and Intel today launched an industry group promising...

Cost of data breaches continues to go in wrong direction: IBM

The average cost of a data breach continues to grow, according to IBM’s annual survey of 16 countries and regions during a recent 12...

Google, Microsoft and others agree to voluntary AI safety action

Seven major American artificial intelligence companies including Google and Microsoft have promised that new AI systems will go through outside testing before they are...

Admins warned to patch NetScaler appliances

Citrix NetScaler admins are being urged to install a patch released this week to plug a critical code injection hole in the company’s Application...

Microsoft expands access to cloud logs after hacker forged tokens to get Exchange Online email

Many Microsoft customers will soon have access to expanded cloud logging capabilities at no additional charge, the company said Wednesday, after cybersecurity experts called...

Worm targeting unpatched Redis databases, say researchers

IT administrators with the open-source Redis database in their environments are being warned of a new peer-to-peer (P2P) worm targeting Windows and Linux servers...

Google launches pilot program to boost cybersecurity

Today, CNBC reported that Google is launching a pilot program in which some employees will be assigned internet-free desktop PCs to reduce the risk...

Chinese hacker forged authentication tokens to access government email: Microsoft

A China-based threat actor was able to access cloud-based Microsoft email accounts of approximately 25 organizations — including government agencies, as well as related...

Russians try to exploit sale of a BMW 5 to hack diplomats in Ukraine: Report

Diplomats based in Ukraine have been the targets of many attempts by Russia to compromise their IT systems. One of the latest was aimed at...

Microsoft warns Office admins to block exploitation of zero-day hole

IT administrators with Microsoft Office in their environments are being urged to take action after the discovery of a previously unknown vulnerability being leveraged...

Purchase of cybersecurity solutions the most popular IT investment among Canadian companies: Nordlayer

Purchase of cybersecurity solutions and cybersecurity training account for more than 50 per cent of what Canadian businesses allocate to their IT budget, new...

Email hack may have revealed personal information, B.C. city warns residents

A British Columbia municipality is warning residents that some of their personal information may be in the hands of hackers after the compromise of...

Popular Posts

Security Blogs

Slideshows

How to equip students with the tools to succeed

Many teams used to spend the entire summer updating student devices. But now the Windows 10 ability to manage the devices without having to...

Stay cyber-safe this holiday season

The holidays are a busy time of year, packed with family gatherings, festive parties and hours spent lining up in crowded stores to buy...

How upgrading your network can deliver a competitive advantage

In 2014, Gartner reported that the average cost of network downtime to an enterprise was $5,600 per minute. And even if the network isn't...

The top three network security challenges for 2016

Securing the network has always been a challenge, but it’s only getting more complex, thanks to the rise of cloud applications, programmable networks and...