Australian Court Stands Firm: X (Formerly Twitter) Ordered to Pay $610,500 Fine in Privacy Breach Case
The ruling upholds a substantial $610,500 fine against X, the platform formerly known as Twitter, for breaching privacy regulations.
Commvault Boosts AWS Cybersecurity with Strategic Clumio Acquisition for Advanced Data Protection
In a strategic move to bolster its AWS cybersecurity offerings, Commvault has acquired Clumio, a cloud-native data protection company. This acquisition significantly enhances Commvault’s capabilities in safeguarding cloud environments, addressing the growing need for robust data protection as organizations increasingly migrate to the cloud.
Salesforce Acquires Israeli Data Innovator Zoomin for $450 Million
In a bold move to bolster its AI capabilities, Salesforce has announced the acquisition of Zoomin, an Israeli data innovator, for $450 million.
Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack, Setting New Benchmark for Cyber Defense
In today's interconnected digital landscape, there's always an ever-present threat of cyberattacks that can disrupt online operations and compromise sensitive data. The recent record-breaking Distributed...
US Congress Faces Escalating Threats as Email Compromise Cases Surge
You may be alarmed to learn that the US Congress is facing a surge in email compromise cases. These sophisticated attacks target the very heart of American democracy, potentially exposing sensitive information and disrupting crucial governmental operations.
CrowdStrike Faces Scrutiny After IT Outage Leads to Congressional Apology
In the realm of cybersecurity, where trust and reliability are paramount, you may find it disconcerting when industry leaders face public scrutiny. Such is the case with CrowdStrike, a prominent cybersecurity firm, which recently found itself in the congressional hot seat after an alarming IT outage.
API Attacks Pose a Growing Threat to Cloud Security
With APIs becoming increasingly integral to modern cloud architectures, they present an alluring target for malicious actors seeking to compromise your sensitive data and disrupt critical operations.