The company's ESG appliances were breached, but their other services remain unaffected by the compromise.
Read moreSecurity professionals warn that Google's new top-level domains, .zip and .mov, pose social engineering risks while providing little reason for their existence.
Read moreAnother traitorous sysadmin story, this one busted by system logs that gave his game away...
Read moreA cybersecurity vulnerability found in an implementation of the social login functionality opens the door to account takeovers and more.
Read moreIt's time to invest in initiatives that engage young women in cybersecurity early and often.
Read moreResearchers say the Iranian nation-state actor known as Tortoiseshell could be behind the attacks.
Read moreIncident response playbooks and frameworks are leaving defenders ill-equipped to recover from the increasing number of successful cyberattacks. Developments in AI offer a new way for stretched teams to...
Read moreAny new cybersecurity technology should be not just a neutral addition to a security stack but a benefit to the other technologies or people managing them.
Read moreIt’s been a big month for US data privacy. Indiana, Iowa, and Tennessee all passed state privacy laws, bringing the total number of states with a privacy law up...
Read moreGoogle Adds Guardrails to Keep AI in Check
May 24 2023Companies are starting to address AI misuse. At Google I/O, for example, executives promised its AI has safety measures.
Read more
Recent Comments