Cybersecurity
The twitterers of the net can’t get over it. On the night of July 15, a hacker, or group of hackers, launched a large-scale scam on Twitter.
A vulnerability discovered in SAP’s NetWeaver Application Server Java allows an attacker to take complete system control without authentication.
This is a large-scale counterfeiting case that has been uncovered by researchers at F-Secure. Switches labeled Cisco, and which were not, contained mechanisms
Google Cloud has introduced its latest Confidential VM and Assured Workloads to provide more data encryption and restrict storage locations to a particular location.
Microsoft has just launched the sixth version of its Android home screen application on the Google Play store. This new launcher follows a six-month preview
The SIGRed vulnerability can spread malware over a network without user interaction. A patch released by Microsoft is urgently needed. Remote code execution
When the Next “20: OnAir virtual event kicks off, Google Cloud announced the integration of two new solutions into its cloud-based data security
The Twitter social network has experienced coordinated hacking of corporate and personal accounts of an unprecedented scale. A social engineering attack
Artificial intelligence in the form of conversational agents, augmented by machine learning and natural language processing, is revolutionizing HR processes and functions.
The Court of Justice of the EU has just sounded the death knell for the Privacy Shield agreement which previously governed the exchange of transatlantic