A McAfee report has identified 38 Android apps that engage in malicious activities on users’ devices. The apps claim to provide Minecraft-like gaming experiences but are free alternatives to the paid mobile version. The cybersecurity firm found that the apps generate unjustified revenue for the game developers by delivering dubious advertisements in the background of […]
Apple and Google are teaming up to combat unwanted tracking through devices such as AirTags and other Bluetooth trackers. The companies have announced a new industry-standard protocol to help prevent unauthorized monitoring, with the specification allowing Bluetooth location-tracking devices to be compatible with detection and alerts across iOS and Android platforms. The initiative builds on […]
Organizational leadership must be knowledgeable about risk management to prevent cybersecurity breaches and safeguard confidential data, which can damage a brand’s reputation. The recent Silicon Valley Bank crisis highlights the importance of reporting security and privacy posture more transparently and frequently, measuring the business impact of risks, and prioritizing security and privacy projects. Consistent communication […]
US lawmakers have introduced a bill called the Taiwan Cybersecurity Resiliency Act aimed at strengthening Taiwan’s cyber defenses amid rising tensions in the Indo-Pacific region. China, who has become a cyber power, is accused of launching millions of cyberattacks each month against Taiwan, with some later used against the US. The bill requires the Department […]
JupiterOne’s State of Cyber Assets Report reveals a significant 133% YoY growth in cyber assets for security organizations, leading to increased security complexity and pressure for cloud enterprises. The report indicates a surge in security vulnerabilities by 589%, which may be attributed to new technologies for vulnerability identification. The report stresses the importance of unified […]
The advancement of AI is expected to provide new tools for spammers to get past filters and persuade people to click on spam messages or provide personal information. Advances in generative language models like ChatGPT could be used to create personalized spam that targets an individual’s preferences, beliefs and personality traits, based on their social […]
The UK’s antitrust regulator has blocked Microsoft’s $69 billion acquisition of gaming giant Activision Blizzard over concerns that it would hinder competition in cloud gaming. The regulator said that Microsoft’s commitment to offer access to Activision’s “Call of Duty” franchise to leading cloud gaming platforms would not effectively remedy its concerns. Microsoft’s President Brad Smith […]
On Wednesday, the U.S. Commerce Secretary, Gina Raimondo, expressed concern that Chinese cloud computing companies, including Huawei Cloud and Alibaba Cloud, could potentially threaten U.S. national security. Raimondo pledged to examine a request made by nine Republican senators to add Huawei’s cloud unit, Alibaba Cloud, and other Chinese cloud service providers to the Entity List, […]
Cybersecurity experts from the SANS Institute have shared insights on the top five most dangerous new attack techniques being employed by cybercriminals and nation-state actors. The panelists presented these emerging Tactics, Techniques, and Procedures (TTPs) during a session at the RSA Conference in San Francisco, advising organizations on how to prepare for them. The SANS […]
The significance of cybersecurity risk in the deal lifecycle cannot be ignored, as it can impact businesses of all sizes and industries. Cybersecurity risk has become more sophisticated and harder to detect, making cyber threats more harmful and costly than ever. Cybersecurity and Data Privacy should be included in the due diligence process as it […]