Contributor

Must read

iPhone thieves use fake “Find My” alerts to steal your device

Swiss cyber authorities uncover a new wave of social engineering attacks that exploit hopes of iPhone theft victims

West and South India drive 89% of server demand

Tier II/III cities emerge as next data centre frontier due to accelerating adoption of cloud, AI, and edge computing

Group-IB detects financially-motivated attacks by Iranian newbie threat actors

Attackers use Dharma ransomware and a mix of publicly available tools.

GenAI will not significantly change the growth of IT spending in near-term

2024 will be the year when organisations actually invest in planning for how to use GenAI, Gartner says

More Chinese groups using ChatGPT for covert operations: OpenAI

Threat actors exploiting AI’s power for influence campaigns, disinformation, and cyber operations, OpenAI says
- Advertisement -