SKY Eye

Cyber security

New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection

Cybersecurity researchers have shed light on a new version of a ransomware strain called HardBit that comes packaged with new obfuscation te...

Twilio's Authy App Breach Exposes Millions of Phone Numbers

Cloud communications provider Twilio has revealed that unidentified threat actors took advantage of an unauthenticated endpoint in Authy to ...

TeamViewer Detects Security Breach in Corporate IT Environment

TeamViewer on Thursday disclosed it detected an "irregularity" in its internal corporate IT environment on June 26, 2024. "We...

Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application

A critical security flaw has been disclosed in Fortra FileCatalyst Workflow that, if left unpatched, could allow an attacker to tamper with ...

Optical neural networks, that use photons instead of electrons, have advantages over traditional systems. They also face major obstacles.

Moore’s law is already pretty fast. It holds that computer chips pack in twice as many transistors every two years or so, producing major ju...

NV5 is a leading engineering firm at the forefront of designing AI compute data centers.

 They engineer, commission, and manage various projects, from underwater transmission lines to high-demand AI compute data centers. As the t...

ZKTeco Biometric System Found Vulnerable to 24 Critical Security Flaws

An analysis of a hybrid biometric access system from Chinese manufacturer ZKTeco has uncovered two dozen security flaws that could be used b...

Cybersecurity takes center stage Disruptive technologies, such as AI/ML, cloud computing, and IoT, are fueling digital transformation while increasing the risk of cyber threats.

 With an ever-evolving and expanding threat landscape, it is time for cyber leaders to take decisive action.   It’s time to be bold. To chan...

Singapore Wealth Flows Face Renewed Scrutiny in Superhacker Case Alleged mastermind Wang YunHe arrested in Singapore on May 24 City-state faces challenges from push to attract ultra-rich

Before he was arrested this month for allegedly running what’s likely the world’s largest cybercrime computer network, Wang YunHe enjoyed a ...

Latrodectus Malware Loader emerges as IcedID successor in fraudulent campaign

Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a nascent m...

SEC accepts amendments to SP regulations to increase protection of consumer information

Securities and Exchange Commission today announced the adoption of amendments to Regulation S-P to modernize and enhance the rules that gove...

Load More
No results found