CISA’s reversing extends support to CVE database

CISA's reversing extends support to CVE database

The nonprofit organization Mitre, which maintains the common vulnerabilities and exposures (CVE) database, said on April 15 that the US government’s funding for its operations expires without renewal; In a reversing at the last minute, however, announced the morning of April 16 that CISA said it has extended support to the database. At the same … Read more

Google’s gift for Enterprise Gmail users: End-to-end encryption

Graphic illustration of Gmail

Image: Google All Gmail business users can now easily apply end-to-end encryption on their emails. Before today, this was a luxury reserved for large companies with significant IT resources, but Google recognizes that E -Mail attacks are increasing everywhere. As of today, Gmail users can send encrypted emails to others in their organization; In the … Read more

Microsoft adds even more AI to his backup filot

Vasu Jakkal, corporate vice president of Microsoft Security.

Vasu Jakkal, Corporate Vice President, Microsoft Security. Image: Microsoft Microsoft raises the bar in the cybersecurity game with a new wave of AI-powered security agents. The company announced an extension of its Microsoft Security Copilot, introducing six AI agents designed to tackle cyber threats head-on. These agents to be launched in April 2025 will help … Read more

Google acquires startup wiz for $ 32B to ‘Turboarcharge enhanced Cloud Security’

Featured graphic with the logos of Wiz and Google ahd a heart icon in the middle.

Image: Wiz Google has announced that it acquires cybersecurity -starting wiz for $ 32 billion. The acquisition is the parent company Alphabet’s largest to date, more than doubling its earlier record-breaking $ 12.5 billion purchases of Motorola mobility in 2012. The wave in generative AI has caused technology companies to rush after Sky Infrastructure, while … Read more

Will Ciscos free tech training for 1.5 m people help close EU skills gap?

Roxana Mînzatu, Executive Vice-President for Social Rights and Skills, Quality Jobs and Preparedness and Cisco Chair and CEO Chuck Robbins.

Roxana Mînzatu, performing vice president of social rights and skills, quality jobs and emergency preparedness and Cisco chairman and CEO Chuck Robbins. Image: Cisco Cisco recently announced his initiative to deliver 1.5 million people in the European Union in 2030 free courses on basic digital skills. Cisco Chairman and CEO Chuck Robbins said the plan … Read more

Update your iPhone now to solve Safari Security Error

Close up of a hand holding an iPhone.

Image: Apple’s official YouTube page Apple has released iOS 18.3.2, an operating system update that fixes a vulnerability in the webkit, the browser engine used by Safari to reproduce web pages. The error enabled malicious code that runs inside the web content Sandbox, an isolated environment for web processes designed to limit security risks to … Read more

Pressure mounts to Apple as the Brazilian Court requires iOS Side Loading

Pressure mounts to Apple as the Brazilian Court requires iOS Side Loading

A Brazilian court has given a major blow to Apple’s closely controlled ecosystem that ordered the tech giant to allow side load on iOS within 90 days. The order follows similar mandates in the EU and signales a global push for more open digital marketplaces. With Apple, which commanded nearly 60% of the US mobile … Read more

Women break into cyber security but lose jobs faster than men

Female IT professional working on a desktop.

Gender diversity in cyber security is slowly improving but inequalities continue – a new report finds that the field has 5% more women than in 2023, but that they are more exposed to other challenges other than male colleagues. About 32% of female respondents said their organizations experienced security settlement over the past year compared … Read more

Generative AI energizes social technical attacks

Generative AI energizes social technical attacks

Phishing was no longer as common in 2024 as before, according to Crowdstrikes 2025 Global Threat Report. Threat players tend to access legitimate accounts through social engineering techniques such as Voice Phishing (Viseing), Callback Phishing and Helpdesk Social Technical Attacks. We are well in an era of what cybersecurity technology-crowdstrike called “the enterprising opponent”, with … Read more

$ 1.5B hack of bybit can be the biggest crypto heist ever

$ 1.5B hack of bybit can be the biggest crypto heist ever

After Revelation Friday from Cryptocurrency Exchange Firm Bybit, which hackers stole digital tokens worth about 1.5 billion dollars – in what is perhaps the biggest crypto heist of all time – wrote CEO Ben Zhou on X Sunday that It has refilled its reserves. Bybit was able to do this through a mix of emergency … Read more