Privacy by Design to become an ISO standard next month
The standard, to be known as ISO 31700, can mesh with organizations that follow the ISO 2700 standard for IT security
Threat actor trying to exploit old Windows weakness
What’s called the Bring Your Own Vulnerable Driver tactic is still being used to compromise Windows, s
Toronto hospital network says IT problems not caused by cyber attack
The University Health Network is still investigating the cause, but says the problems ‘were entirely
Cybercrooks starting to use ChatGPT, say researchers
Analysts at Check Point Software discovery threads on criminal forums discussing how to leverage the
Threat actors will take advantge of ChatGPT, says expert
Reverse-engineering security applications and perfecting malware are some of the ways threat actors might us
SickKids hospital has restored 80 per cent of priority IT systems
The Toronto hospital’s electronic medical records system wasn’t affected in the ransomw
DevOps platform CircleCI urges users to rotate all secrets
Warning comes after company discovers an undefined securit
Stolen data on 200 million Twitter users now being given away
Cache of information has the handles used by Twitter subscribers and their email
Are ransomware attacks in U.S. up or down? Why it’s hard to say
Emsisoft researchers complain lack of reporting makes for
PyTorch users warned of malicious copy in PyPI registry
Warning aimed at those who downloaded PyTorch-nightly on Linux during the ho