VPN

Zero-day exploits increasingly sought out by attackers

Threat actors – both state-backed and financially motivated – are increasingly taking advantage of previously unknown vulnerabilities, or zero-days, to compromise their victims before fixes or patches are made available by the tech industry, according to an advisory published by the Five Eyes cyber agencies, including the UK’s National Cyber Security Centre (NCSC) and the…

Zero-day exploits increasingly sought out by attackers Read More »

China’s Volt Typhoon rebuilds botnet in wake of takedown

The Chinese state threat actor most famously known as Volt Typhoon is staging a significant comeback after its botnet infrastructure was disrupted in a US-led takedown at the beginning of February 2024. Volt Typhoon’s malicious botnet comprised hundreds of Cisco and Netgear small and home office (SOHO) routers that had reached end-of-life (EOL) status and…

China’s Volt Typhoon rebuilds botnet in wake of takedown Read More »

I found an amazing new use for ChatGPT Advanced Voice Mode

OpenAI rolled out Advanced Voice Mode to US and international users several weeks ago, but I was left out of this big ChatGPT (GPT-4o) upgrade because the European Union region wasn’t covered. Fast-forward to last week, and OpenAI quietly rolled out Advanced Voice Mode support to ChatGPT Plus users in the EU, Switzerland, Iceland, Norway,…

I found an amazing new use for ChatGPT Advanced Voice Mode Read More »

Robust cloud IAM should align to zero-trust principles

In today’s digital landscape, the traditional security perimeter has dissolved, making identity the new frontline of defence. As organisations increasingly adopt cloud services and remote work models, managing and securing identities has become paramount. Effective identity and access management (IAM) practices are essential for IT departments to safeguard against cyber-attacks, phishing attempts, and ransomware threats.…

Robust cloud IAM should align to zero-trust principles Read More »

Cyber companies need a best practice approach to major incidents.

Cyber security companies have made global headlines recently with a series of significant incidents which caused widespread disruption. The CrowdStrike incident is estimated to have cost Fortune 500 companies as much as $5.4bn, according to Parametrix analysis. The Okta data breach and Ivanti Virtual Private Network (VPN) vulnerabilities raise similar concerns about the impact cyber…

Cyber companies need a best practice approach to major incidents. Read More »

Opera wants its new AI to change how people use web browsers

During its Opera Browser Days event in Bristol, England, browser company Opera revealed some of its latest AI developments.According to Joanna Czajka, product director for the Opera Browser, the browser experience users have today will be vastly different in two years. So far, the Opera browser has led this change by being the first browser…

Opera wants its new AI to change how people use web browsers Read More »

tvOS 17: Features, release date, Apple TV compatibility, more

tvOS 17 was Apple’s previous operating system for Apple TV and HomePod. After two years of minor updates, Cupertino finally gave this operating system keynote time and announced several new features. Here’s everything you need to know about tvOS 17.To learn more about Apple’s latest Apple TV operating system, BGR has a complete guide for…

tvOS 17: Features, release date, Apple TV compatibility, more Read More »

HSBC tests post-quantum VPN tunnel for digital ledgers

HSBC has worked with Quantinuum to trial “the first application” of quantum-secure technology for distributing tokenised physical gold. The HSBC Gold Token for retail investors in Hong Kong allows the bank’s customers to acquire fractional ownership of physical gold. Moving these tokens over financial networks requires encryption that cannot be broken by high-performance quantum computers…

HSBC tests post-quantum VPN tunnel for digital ledgers Read More »

Fog ransomware crew evolving into wide-ranging threat

The Fog ransomware crew has been observed ramping up attack volumes and targeting new, more lucrative verticals in the never-ending search for a pay-out, and may be on its way to becoming one of the more high-profile cyber crime organisations, according to intelligence published by incident responders at Adlumin. Last month, the Adlumin incident responce…

Fog ransomware crew evolving into wide-ranging threat Read More »

NCSC and allies call out Russia’s Unit 29155 over cyber warfare

The UK’s National Cyber Security Centre (NCSC) and its counterpart bodies in the Five Eyes intelligence alliance have joined partners from Czechia, Estonia, Germany, Latvia and Ukraine to identify a Russian military cyber unit that has been conducting a sustained campaign of malicious activity over the past four years. Part of the Main Directorate of…

NCSC and allies call out Russia’s Unit 29155 over cyber warfare Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top