-
Patch or perish: How organizations can master vulnerability management
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
-
How scammers are exploiting DeepSeek’s success
As eager as ever to capitalize on the latest big thing, cybercriminals have wasted no time launching attacks that take advantage of the meteoric rise of DeepSeek’s AI model
-
Untrustworthy AI: How to deal with data poisoning
You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so
-
This month in security with Tony Anscombe – January 2025 edition
DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal another eventful year in cybersecurity and data privacy
-
Brian Greene: Until the end of time | Starmus highlights
The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the eventual fate of everything, including humanity
-
Going (for) broke: 6 common online betting scams and how to avoid them
Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly set by scammers
-
The evolving landscape of data privacy: Key trends to shape 2025
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams
-
Under lock and key: Protecting corporate data from cyberthreats in 2025
Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage
-
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
The story of a signed UEFI application allowing a UEFI Secure Boot bypass
-
UEFI Secure Boot: Not so secure?
A vulnerability affecting a UEFI application and discovered by ESET researchers could let malicious actors deploy malicious bootkits on vulnerable systems