Tanased Hemathulin/Getty Images Have you ever created a document in Google Drive and wished you had a way to use the file to collect information from others? Sure, you could always opt...
Andriy Onufriyenko/Getty Images Employees might recognize the potential leak of sensitive data as a top risk, but some individuals still proceed to input such information into publicly...
Yuichiro Chino/Getty Images Singapore is looking to boost its national broadband network to better prepare for emerging technologies, such as artificial intelligence (AI) and autonomou...
The Chair of the Open-Ended Working Group on the security of and in the use of information and communications technologies (OEWG) published a discussion paper on a Checklist of Practical Actionsfor the implementation of voluntary,...
Google has launched Gemma, a new family of lightweight open models that includes Gemma 2B and Gemma 7B. These models were inspired by Google's Gemini models and are designed for both commercial and research use. While Google descr...
The Chair of the Open-Ended Working Group on the security of and in the use of information and communications technologies (OEWG) published a discussion paper on draft elements for the permanent mechanism on ICT security. The foll...
In the takedown of LockBit, described as 'the most prolific and harmful ransomware group' by Graeme Biggar, director general of Britain's National Crime Agency (NCA), it was revealed that the gang retained data even after receivin...
The Chair of the Open-Ended Working Group on the security of and in the use of information and communications technologies (OEWG) circulated a set of preliminary guiding questions to assist delegations in their preparations for th...
Researchers from China and the US found that the sound of phone swiping can reveal users' fingerprints. Essentially, they used an attack scenario on the minutiae-based Automatic Fingerprint Identification System (AFIS), called Pri...
Russian authorities, in collaboration with cybersecurity firm F.A.C.C.T have detained members of the SugarLocker ransomware gang. The gang masqueraded as a legitimate IT firm Shtazi-IT, while conducting their illicit activities. O...
The European Commission has unveiled a digital connectivity package aimed at boosting innovation, security, and resilience of digital infrastructures in Europe. The package addresses the challenges faced by Europe in rolling out f...
The Biden-Harris Administration announced a series of new cybersecurity measures to secure the US ports, in tandem with efforts to strengthen supply chains and revitalise the US industrial base. The official press release highligh...