When tackling AI security issues, enterprises should minimize shadow IT risks, establish an AI governance council and train employees on the proper use of AI tools.
When tackling AI security issues, enterprises should minimize shadow IT risks, establish an AI governance council and train employees on the proper use of AI tools.
New technologies get all the headlines, but VPNs aren’t going away anytime soon. Speed and security are among the factors to consider when determining what type of VPN to use.
At Ignite in New York, the vendor laid out plans to use AI and platformization to consolidate cybersecurity tools and data to combat increasingly sophisticated attacks.
Identity and access management is the backbone of enterprise data security. A strong IAM framework that manages identities and which […]
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also […]
In March 2025, data allegedly sourced from German Doner Kebab was published on a popular hacking forum. The data included 162k unique email addresses alongside names, phone numbers and physical addresses. German Doner Kebab subsequently sent a disclosure notice to impacted individuals.
In March 2025, a phishing attack successfully gained access to Troy Hunt’s Mailchimp account and automatically exported a list of people who had subscribed to the newsletter for his personal blog. The exported list contained 16k email addresses and other data automatically collected by Mailchimp including IP address and a derived latitude, longitude and time zone.
In June 2024, spyware maker SpyX suffered a data breach that exposed almost 2M unique email addresses. The breach also exposed IP addresses, countries of residence, device information and 6-digit PINs in the password field. Further, a collection of iCloud credentials likely used to monitor targets directly via the cloud were also in the breach and contained the target’s email address and plain text Apple password.
In February 2025, the public safety policy management systems company Lexipol suffered a data breach. Attributed to the self-proclaimed “Puppygirl Hacker Polycule”, the breach exposed an extensive number of documents and user records which were subsequently published publicly. The breach included over 670k unique email addresses in the user records, along with names, phone numbers, system-generated usernames and passwords stored as either MD5 or SHA-256 hashes.
A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, […]