North Korean state hackers appear to be spying on Russia, by planting a backdoor inside of bespoke, internal government software.In mid-January 2024, a sample...
In a thought-provoking piece by Hayden Field for CNBC, the evolving landscape of workplace surveillance is meticulously examined, revealing a world where artificial intelligence...
Digital Security In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and...
ESET researchers provide an analysis of an attack carried out by a previously undisclosed China-aligned threat actor we have named Blackwood, and that we...
Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari.The bug, assigned as CVE-2024-23222, stems from a type confusion...
The ambient light sensors typically employed in smart devices for adjusting screen brightness could capture images of user interactions and could pose a unique...
Phones and computers host some of the most private information about us — our financial information, photos, text histories, etc. Hardly any of it...
The Canadian government is working on a framework to tackle discrimination in the hiring processes within government departments, specifically addressing privacy and transparency issues.
This...
As financial institutions gear up for the next 12 months, it’s time to reflect on the key trends and developments, considering how they’ll shape...