This week at Google Cloud Next, we’re sharing how AI can help advance your mission.
Author Archives: [email protected]
Fortinet has released security patches for a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. […]
Award-winning program named finalist for Best Professional Certification Program SEATTLE – April 9, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is proud to announce that its award-winning Certificate of Competence in Zero Trust (CCZT) has […]
Hackers exploited a vulnerability in Gladinet CentreStack’s secure file-sharing software as a zero-day since March to breach storage servers […]
Every year, the Xbox Games Showcase delivers a sneak peek at upcoming first-party and third-party partner studio titles. This summer, the show will be digital-only. And, it’s going to be a double feature, with new gameplay, details, and developer insights for Obsidian Entertainment’s The Outer Worlds 2 Direct, the sequel to the award-winning, first-person sci-fi […]
Microsoft is investigating an ongoing outage that is blocking admins worldwide from accessing the Exchange Admin Center (EAC). […]
Lovable, a generative artificial intelligence (AI) powered platform that allows for creating full-stack web applications using text-based prompts, has been found to be the most susceptible to jailbreak attacks, allowing novice and aspiring cybercrooks to set up lookalike credential harvesting pages. “As a purpose-built tool for creating and deploying web apps, its capabilities line up […]
AI is making voice phishing (vishing) more dangerous than ever, with scammers cloning voices in seconds to trick employees into handing over their credentials. Learn how to defend your organization with Specops Secure Service Desk. […]
Microsoft says some Windows users might be unable to log into their accounts via Windows Hello after installing the April 2025 security updates. […]
Phishing actors are employing a new evasion tactic called ‘Precision-Validated Phishing’ that only shows fake login forms when a user enters an email address that the threat actors specifically targeted. […]