Ethical hacking of computer systems or networks done with the permission of its owner does not attract any liability under the IT Act, Parliament was informed on Friday. The Minister…
Hot Topics
-
-
Akamai Technologies has released a report focusing on the threats posed to consumers and businesses in Asia-Pacific due to malicious domain name system (DNS) traffic. Akamai Technologies, the cloud company…
-
CloudSEK researchers have exposed nefarious tactics employed by threat actors to hijack Facebook accounts and misuse the popularity of ChatGPT to spread malware. The finding shows that ChatGPT, a popular…
-
Tenable announced significant advancements to Tenable Cloud Security, a unified and scalable Cloud Security Posture Management (CSPM) and vulnerability management solution delivered on the Tenable One exposure management platform, and…
-
US Cybersecurity & Infrastructure Security Agency (CISA) has released a new tool that allows detecting signs of hacking activity in Microsoft cloud services. Developed in collaboration with Sandia, a US…
-
sites. F5 Distributed Cloud Services are differentiated in providing connectivity and security at both the network and application layers. As an overlay across separate cloud provider offerings (including native-cloud services),…
-
Splunk Inc., the cybersecurity and observability firm, announced innovations to Splunk’s unified security and observability platform to help build safer and more resilient digital enterprises. Splunk’s latest innovations include enhancements…
-
In 2022 alone, global cyberattacks increased by 38%, resulting in substantial business loss, including financial and reputational damage. Meanwhile, corporate security budgets have risen significantly because of the growing sophistication…
