MOVEit Transfer attacks hit British Airways, BBC and more
Clop Ransomware Group Exploited MOVEit Transfer Vulnerability Since 2021 According to security…
Cabinet is making money for more IT professionals on the labor market
Government Allocates 123 Million Euros to Reduce Shortage of ICT Professionals The…
Meta suggests Twitter counterpart internally
Meta to Launch Twitter Competitor App Meta is set to launch a…
How modern attack methods compromise current cybersecurity strategies
Cybercriminals Evolve Tactics to Launch More Deadly Attacks Cybercriminals have been waging…
Mendix Unveils ISV Software Component Exchange Program
Mendix Expands Partner Ecosystem with ISV Program Mendix is expanding its partner…
Google teaches about safe AI use with Secure AI Framework
Google Launches Secure AI Framework to Help Organizations Use AI Responsibly Google…
Researchers accurately identify AI-generated academic articles
AI-Generated Academic Articles Can Be Distinguished From Human Texts A study published…
North Korean gang Lazarus behind Atomic Wallet hack
North Korean Hackers Steal $50 Million in Cryptocurrency from Atomic Wallet Blockchain…
Bypassing the guard. How applications protected by a Sentinel hardware key are opened
Bypassing Sentinel Hardware Key Protection for Java Applications Reverse engineering applications written…