Google announces quantum -proof digital signatures in Sky KMS

Google announces quantum -proof digital signatures in Sky KMS

Google announced on Thursday the development of quantum -proof digital signatures (FIPS 204/FIPS 205) in Google Cloud Key Management Service (Cloud KMS) to software -based keys. This is available in preview. The Search giant also provided a high-level view in its post quantum strategy for Google Cloud encryption products, including Cloud KMS and Cloud Hardware … Read more

The leaders fear AI-driven cyber security costs will hover

The leaders fear AI-driven cyber security costs will hover

The leaders are concerned about the rocket cost of cyber security tools that are flooded with AI functions. Meanwhile, hackers are largely avoiding AI, as there are relatively few discussions about how they could use what was posted on cybercrime forums. 1 New Relic Employees per Business size Micro (0-49), small (50-249), medium (250-999), large … Read more

The British government allegedly requires access to encrypted iCloud files

The British government allegedly requires access to encrypted iCloud files

The British Office of the Home Secretary has reportedly asked Apple to provide a back door to any material every user has uploaded to iCloud worldwide, the Washington Post reported on February 7. Anonymous sources gave the Washington Post the information and expressed concern that tech companies were geared for government monitoring. Apple has not … Read more

Sophos acquires SecureWorks for $ 859 million

Sophos acquires SecureWorks for $ 859 million

Sophos has completed its acquisition of $ 859 million by managed Cyber ​​Security Services SecureWorks in an all-contents transaction. It now claims to be the “leading pure -play” provider of managed detection and response services that support more than 28,000 global organizations. Secureworks is an Atlanta, US-based cyber security company that focuses on threat detection, … Read more

Apple M-Series chips are vulnerable to side duct attack

Apple M-Series chips are vulnerable to side duct attack

Security researchers from the Georgia Institute of Technology and Ruhr University Bochum discovered two side channels of vulnerabilities in devices with Apple-names brand chips from 2021 or later, which could postpone sensitive information to attackers. Specifically, the vulnerabilities known as slack and flop foam Credit Card information, locations and other personal data. Data can be … Read more

Phishing emails in Australia rise by 30%

Phishing emails in Australia rise by 30%

The number of phishing emails received by Australians increased by 30% last year, new research from security firm Abnormal Security has found. Cybercriminals have increasingly targeted the Asia-Pacific region, in part because it is becoming a bigger player in critical industries such as data centers and telecommunications. For APAC as a whole, credential phishing attacks … Read more

Sneaky log phishing scheme targets two-factor security

Sneaky log phishing scheme targets two-factor security

Security researchers at French company Sekoia discovered a new phishing-as-a-service kit targeting Microsoft 365 accounts in December 2024, the company announced on January 16. The kit, called Sneaky 2FA, was distributed through Telegram by the threat actor service Sneaky Log. It is associated with about 100 domains and has been active since at least October … Read more

Microsoft will end support for Office 365 apps on Windows 10 in October

Microsoft will end support for Office 365 apps on Windows 10 in October

Microsoft has announced that the last day it will offer security support for Word, Excel, and PowerPoint on Windows 10 will be October 14, 2025. Businesses that rely on Microsoft 365 apps and use the legacy operating system should upgrade to Windows 11. “After that date, if you run Microsoft 365 on a Windows 10 … Read more