Skip to content

Secure Your Digital Life

  • Home
  • Data Protection

Category: Data Protection

  • Home
  • Data Protection
  • Page 45
Data Protection

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database

Apr 29, 2025Ravie LakshmananVulnerability / Web Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade

Read More
Data Protection

Ransomware-Attacke bei Hitachi Vantara | CSO Online

Die Ransomware-Gruppe Akira soll bei Hitachis IT-Services- und Infrastruktur-Tochter zugeschlagen haben. TY Lim | shutterstock.com Vertreter von Hitachi Vantara haben gegenüber dem Security-Portal Bleeping Computer

Read More
Data Protection

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool

Apr 29, 2025Ravie LakshmananCybersecurity / Malware In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile

Read More
Data Protection

Was ist ein Keylogger?

Keylogger sind Malware der alten Schule. Lesen Sie, wie die Tools zur Tastaturüberwachung funktionieren und warum sie nicht nur etwas für Cyberkriminelle sind. IM_photo |

Read More
Data Protection

House passes bill to study routers’ national security risks

A bill requiring the Department of Commerce to study national security issues posed by routers and modems controlled by U.S. adversaries passed the House on

Read More
Data Protection

Cisco automates AI-driven security across enterprise networks

“The result is automated detection and response for the most common attacks,” Shipley wrote in a blog post about the new XDR capabilities. “Machine learning,

Read More
Data Protection

Kali Linux warns of update failures after losing repo signing key

​Offensive Security warned Kali Linux users to manually install a new Kali repository signing key to avoid experiencing update failures. The announcement comes after OffSec

Read More
Data Protection

IBM aims for autonomous security operations

“IBM’s proactive threat hunting augments traditional security solutions to uncover anomalous activity and IBM’s proactive threat hunters work with organizations to help identify their crown

Read More
Data Protection

Hitachi Vantara takes servers offline after Akira ransomware attack

Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was forced to take servers offline over the weekend to contain an Akira ransomware attack. The

Read More
Data Protection

Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOne

SAN FRANCISCO — A sweeping public statement signed by more than 30 prominent cybersecurity professionals and academics has condemned what they describe as political retaliation

Read More

Posts pagination

Previous 1 … 44 45 46 … 201 Next
  • Fake AI video generators drop new Noodlophile infostealer malware
  • Microsoft Teams will soon block screen capture during meetings
  • What Is CaaS (Containers-as-a-Service)?
  • Where To Watch Why Women Kill for Free (Seasons 1 & 2) in 2025
  • Your Android phone is getting a new security secret weapon – and it’s a big deal
All Rights Reserved 2026.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.