Ukraine looks to enhance European integration with ENISA special partner status
Intel Confirms Source Code Leak
Cyber-criminals could use the leaked source code to help launch attacks
ThermoSecure: Cracking Passwords Using Finger Heat on Keyboards is Now Possible
A group of researchers have guessed 100% of six-character passwords using this attack
The Internet Architecture Board Takes on Sustainability
Join Akamai and the Internet Architecture Board to make #shift happen. Let’s work together to make life better for billions of people, billions of times a day. #GreenWithAkamai
German Cybersecurity Chief Faces Sacking Over Possible Russia Ties
Schoenbohm accused of having maintained contacts with people involved with Russian security services
Facebook Login Details at Risk as Meta Identifies Over 400 Malicious Apps
Some of the malicious apps are able to evade detection and continue to make it onto legitimate app stores
91% of Cyber Pros Experience Mental Health Challenges at Work
Factors contributing to mental health challenges included poor culture and the stressful nature of the work
LofyGang Group Linked to Recent Software Supply Chain Attacks
The group focuses on utilizing open-source software for malicious purposes
534 civilian bodies found so far in Ukrainian territory recaptured from Russia
Investigators said they identified 22 sites used as torture rooms by Russian troops.
RCE on Log4j Among Top CVEs Exploited By Chinese-Backed Hackers
In a joint advisory, three US agencies, NSA, CISA and FBI, warned about Chinese threat actors