TikTok unveils European data security plan amid calls for US banMove comes as White House backs bill that could give it power to ban Chinese-owned app...
UK bans TikTok from government mobile phones
UK bans TikTok from government mobile phonesMove brings Britain in line with US and Europe and reflects worsening relations with China Britain is to ban the...
UK expected to ban TikTok from government mobile phones
UK expected to ban TikTok from government mobile phonesBan on Chinese owned video-sharing app marks U-turn from previous relaxed position Britain is expected to announce a...
The TikTok wars – why the US and China are feuding over the app
The TikTok wars – why the US and China are feuding over the appThe US says the extremely popular video-sharing app ‘screams’ of national security concerns...
MPs and peers ask information commissioner to investigate TikTok
MPs and peers ask information commissioner to investigate TikTokLetter argues that Chinese-owned video-sharing app could be in breach of UK law A cross-party group of MPs...
US threatens to ban TikTok unless Chinese owners divest
US threatens to ban TikTok unless Chinese owners divestMove is latest escalation by lawmakers over fears user data could be passed on to China’s government The...
TikTok to be banned from UK parliamentary devices
TikTok to be banned from UK parliamentary devicesMove follows UK government’s decision to ban Chinese-owned video-sharing app Politics live - latest updates Parliament is to ban...
BBC urges staff to delete TikTok from company mobile phones
BBC urges staff to delete TikTok from company mobile phonesMove comes after UK government bans app on government devices over fears of data being accessed by...
TikTok banned on London City Hall devices over security concerns
TikTok banned on London City Hall devices over security concernsMove by Greater London authority comes after Chinese-owned app was blocked on UK parliamentary devices London City...
Cyberpion rebrands as Ionix, offering new EASM visibility improvements
Cyberpion rebrands as Ionix, offering new EASM visibility improvementsSaaS-based external attack surface management (EASM) company Cyberpion has rebranded as Ionix, at the same time adding a...
Critical flaw in WooCommerce can be used to compromise WordPress websites
Critical flaw in WooCommerce can be used to compromise WordPress websitesWooCommerce, a popular plug-in for running WordPress-based online stores, contains a critical vulnerability that could allow...
What TikTok knows about you – and what you should know about TikTok
What TikTok knows about you – and what you should know about TikTokAs TikTok CEO attempts to placate U.S. lawmakers, it’s time for us all to...
Highlights from TikTok CEO’s Congress grilling – Week in security with Tony Anscombe
Highlights from TikTok CEO’s Congress grilling – Week in security with Tony AnscombeHere are some of the key moments from the five hours of Shou Zi...
City of Toronto is one of the victims hacked by Clop gang using GoAnywhere zero-day
City of Toronto is one of the victims hacked by Clop gang using GoAnywhere zero-dayClop ransomware gang added the City of Toronto to the list of its...
China-linked hackers target telecommunication providers in the Middle East
China-linked hackers target telecommunication providers in the Middle EastResearchers reported that China-linked hackers targeted telecommunication providers in the Middle East in the first quarter of 2023....
CISA announced the Pre-Ransomware Notifications initiative
CISA announced the Pre-Ransomware Notifications initiativeThe US Cybersecurity and Infrastructure Security Agency (CISA) announced the Pre-Ransomware Notifications service to help organizations stop ransomware attacks before damage occurs....
Why Tackling Financial Crime Calls for A Privacy-First Approach
Why Tackling Financial Crime Calls for A Privacy-First ApproachBy Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight...
Why You Can’t Have True Zero Trust Without API Security
Why You Can’t Have True Zero Trust Without API SecurityBy Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and...
A Hacker’s Mind News
A Hacker’s Mind NewsMy latest book continues to sell well. Its ranking hovers between 1,500 and 2,000 on Amazon. It’s been spied in airports. Reviews are...
Friday Squid Blogging: Creating Batteries Out of Squid Cells
Friday Squid Blogging: Creating Batteries Out of Squid CellsThis is fascinating: “When a squid ends up chipping what’s called its ring tooth, which is the nail...
Mobile Myths: Can My Apple Devices Get Hacked?
Mobile Myths: Can My Apple Devices Get Hacked? “I bought a Mac, because it’s safer than a PC.” “I always surf the web with my iPhone,...
Spot and Remove Viruses from Your Android Phone
Spot and Remove Viruses from Your Android Phone So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several...
Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New study
Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New studyCisco’s just-released 2023 Cybersecurity Index shows companies will invest more in security, but...
DevSecOps puts security in the software cycle
DevSecOps puts security in the software cycleAddressing cybersecurity can be a challenge when the focus is on speed in software development and production life cycles. The...
OpenAI: ChatGPT payment data leak caused by open-source bug
OpenAI: ChatGPT payment data leak caused by open-source bugOpenAI says a Redis client open-source library bug was behind Monday's ChatGPT outage and data leak, where users...
Australian police arrest four BEC actors who stole $1.7 million
Australian police arrest four BEC actors who stole $1.7 millionThe Australian Federal Police (AFP) has arrested four members of a cybercriminal syndicate that has laundered $1.7...
Microsoft shares tips on detecting Outlook zero-day exploitation
Microsoft shares tips on detecting Outlook zero-day exploitationMicrosoft today published a detailed guide aiming to help customers discover signs of compromise via exploitation of a recently...
The Week in Ransomware – March 24th 2023 – Clop overload
The Week in Ransomware - March 24th 2023 - Clop overloadThis week's news has been dominated by the Clop ransomware gang extorting companies whose GoAnywhere services...
FBI confirms access to Breached cybercrime forum database
FBI confirms access to Breached cybercrime forum databaseToday, the FBI confirmed they have access to the database of the notorious BreachForums (aka Breached) hacking forum after...
Windows, Ubuntu, and VMWare Workstation hacked on last day of Pwn2Own
Windows, Ubuntu, and VMWare Workstation hacked on last day of Pwn2OwnOn the third day of the Pwn2Own hacking contest, security researchers were awarded $185,000 after demonstrating 5...




























