
Afraid of AI? We should be
Not (yet!) of a sentient digital entity that could turn rogue and cause the end of mankind, but the exploitation of artificial intelligence and machine learning for nefarious …

Whitepaper: What is GDPR and what does your organisation need to do to comply?
This whitepaper is no longer available. On May 25, the General Data Protection Regulation will bring sweeping changes to data security in the European Union. If your …

Even with cloud providers implementing defenses, glaring weaknesses remain
A new report from RedLock offers a look at the threats and vulnerabilities that continue to mount in public cloud computing environments. Account compromises keep rising Poor …

The advent of GDPR could fuel extortion attempts by criminals
The number of exploit kit attacks is, slowly but surely, going down, and malware peddlers are turning towards more reliable tactics such as spam, phishing, and targeting …

Hack In The Box announces keynote speakers for 2018 Amsterdam event
Hack In The Box Security Conference (HITBSecConf) is returning to Amsterdam in April this year with more than 70 speakers who will take to stage. This year’s marks the 9th …

What types of hospitals experience data breaches?
An estimated 16 million patient records were stolen in the United States in 2016, and last summer the British health system was crippled by a ransomware attack. While we know …

US sets up dedicated office for energy infrastructure cybersecurity
The US government is setting up a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the US Department of Energy. The CESER office will focus on …

Russian, Indian banks lose millions to hackers
The Russian central bank’s Financial Sector Computer Emergency Response Team (FinCERT) disclosed on Friday that hackers compromised a computer at a Russian bank and used …

Global cyber risk perception: Highest management priorities
Few organizations are highly confident in their ability to manage the risk of a cyber-attack, despite viewing cybersecurity as a top risk management priority, according to a …

Week in review: Vulnerability tracking, GDPR quick guide, tackling the insider threat
Here’s an overview of some of last week’s most interesting news and articles: Intel offers to pay for Spectre-like side channel vulnerabilities Intel is expanding …

Dell EMC plugs critical bugs in VMAX enterprise storage offerings
Dell EMC has patched two critical flaws in vApp Manager, the management interface for its VMAX enterprise storage systems, and is urging all customers to implement fixes as …

Scanned IDs of 119,000 FedEx customers exposed online
An unsecured Amazon Web Services bucket holding personal information and scans of IDs of some 119,000 US and international citizens has been found sitting online by Kromtech …