Monthly Archives: January 2025

FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance

The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices. “IoT products can be susceptible to a range of security vulnerabilities,” the U.S. Federal Communications Commission (FCC) said. “Under this program, qualifying consumer smart products that meet robust cybersecurity standards will […]

Best Midjourney Prompts for Graphic Design: Illustrations, Logos, & More

These are the best Midjourney prompts for graphic design covering various domains, like product packaging, branding, logos, concept designs, and more. Midjourney is a top-tier AI image generator that creates realistic and creatively unique images from text prompts. It’s great for overcoming creative blocks or generating reference images to spark new ideas. Below, I’ll show […]

CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three flaws impacting Mitel MiCollab and Oracle WebLogic Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-41713 (CVSS score: 9.1) – A path traversal vulnerability in Mitel MiCollab that could allow […]

Explore the business case for responsible AI in new IDC whitepaper

I am pleased to introduce Microsoft’s commissioned whitepaper with IDC: The Business Case for Responsible AI. This whitepaper, based on IDC’s Worldwide Responsible AI Survey sponsored by Microsoft, offers guidance to business and technology leaders on how to systematically build trustworthy AI. In today’s rapidly evolving technological landscape, AI has emerged as a transformative force, […]

A Day in the Life of a Prolific Voice Phishing Crew

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety […]