OAIC determines AFP interfered with privacy of Australians after using Clearview AI

In an investigation conducted by Australia’s Information Commissioner (OAIC), it has found the Australian Federal Police’s (AFP) use of the Clearview AI platform interfered with the privacy of Australian citizens.…

Grindr Fined €6.5m for Selling User Data Without Explicit Consent

Grindr Fined €6.5m for Selling User Data Without Explicit Consent Dating app Grindr has been fined €6.5m (£5.5m) for selling user data to advertisers without their explicit consent. The fine…

Why Payroll Is The Next Company Security Battleground?

Payroll is one of the most appealing targets for cybercriminals, involving as it does the large transfer of money between institutions whilst being susceptible to hacking due to outdated technology…

Make Microsoft Defender AV Enterprise Class FREE – Morphisec Guard Lite

According to research, there are over 500 Million endpoints protected by the Microsoft Windows Defender Antivirus product. The sheer volume of endpoints makes Microsoft Defender a prime target for hackers…

What Is a Virtual Patch and Why You Need It

Software vulnerabilities are one of the biggest nuisances for cybersecurity because cybercriminals love to exploit them. Read on to find out how you can be one step ahead by applying…

Tactical Threat Intelligence: What is it and practical use cases

As digital technologies continue to become central to every industry, they foster greater connectivity, automation and potential for advancement. But, they also increase the threat of cyber-attacks, forcing security experts…

AWS launches its second Top Secret region

Amazon Web Services on Tuesday announced the launch of its second Top Secret region, AWS Top Secret-West. The new region is accredited to operate workloads at the Top Secret US…

Cybersecurity Trends for 2022

Trend Micro – Trend Micro – You’ve heard it before: the pandemic accelerated digital transformation. And there doesn’t seem to be any signs of slowing down. But what does an…

Misconfigured Kafdrop Instances Lead to Sensitive Data Exposure for Many Companies

A new report shows how cloud misconfiguration could lead to critical data exposure of an organization. Researchers revealed that misconfigured Kafdrop instances, Kafdrop being the Apache Kafkas’s management interface, led…

Are You Guilty of These 8 Network-Security Bad Practices?

Tony Lauro, director of Security Technology & Strategy at Akamai, discusses VPNs, RDP, flat networks, BYOD and other network-security bugbears. They say the first step in addressing a serious issue…