Opponents claim the new bill hinders right to information, while there are concerns on data transfers outside the country.
Read moreFurther TETRA-related vulnerabilities have been disclosed in base stations that run and decrypt the worldwide communications protocol for industrial systems.
Read moreCustom Yashma Ransomware Crashes Into the Scene
August 9 2023The threat actor is targeting organizations in Bulgaria, China, Vietnam, and various English-speaking nations.
Read moreCustom Yashma Ransomware Crashes Into the Scene
August 9 2023The threat actor is targeting organizations in Bulgaria, China, Vietnam, and various English-speaking nations.
Read moreMany organizations have failed to patch a critical zero-day vulnerability, allowing hackers to install Web shells on hundreds of endpoints.
Read moreAre we really improving security, or are we just imposing more regulation?
Read moreMore-effective cyber-risk management controls can help bolster a company's policy worthiness. Start with these 10 tips to manage risk as underwriter requirements get more sophisticated.
Read moreThreat actors such as the operators of the Cl0p ransomware family increasingly exploit unknown and day-one vulnerabilities in their attacks.
Read more
Recent Comments