Opponents claim the new bill hinders right to information, while there are concerns on data transfers outside the country.
Read moreFurther TETRA-related vulnerabilities have been disclosed in base stations that run and decrypt the worldwide communications protocol for industrial systems.
Read moreCustom Yashma Ransomware Crashes Into the Scene
August 9 2023The threat actor is targeting organizations in Bulgaria, China, Vietnam, and various English-speaking nations.
Read moreCustom Yashma Ransomware Crashes Into the Scene
August 9 2023The threat actor is targeting organizations in Bulgaria, China, Vietnam, and various English-speaking nations.
Read moreMany organizations have failed to patch a critical zero-day vulnerability, allowing hackers to install Web shells on hundreds of endpoints.
Read moreAre we really improving security, or are we just imposing more regulation?
Read moreMore-effective cyber-risk management controls can help bolster a company's policy worthiness. Start with these 10 tips to manage risk as underwriter requirements get more sophisticated.
Read more
Recent Comments