After having signed the contract to build the Japanese supercomputer "K," one of the most powerful in the world, Fujitsu has announced a new flagship project: Post-K , based on...
F6 has reported a new wave of malicious emails associated with the Hive0117 group. Hive0117 has been active since February 2022 and uses the DarkWatchman RAT Trojan . The group...
Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies...
Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that can lead to a complete domain compromise. Among the most critical...
Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der Spiegel reported the news in yesterday's update. IT services provider...
An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software development. The Open Source Security Foundation (OpenSSF),...
The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage of their development. Child and adolescent health experts warn that...
TikTok's fate in the United States is now inextricably linked to political negotiations. The White House has announced that the service's recommendation algorithm will be replicated and adapted solely based...
Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire text aloud, the browser can summarize the material in a...
Mozilla has introduced a new feature for Firefox add-on developers that allows them to quickly revert to a previously approved version and fix critical issues in situations where fixing and...