India Readies Overhauled National Data Privacy Rules

India Readies Overhauled National Data Privacy Rules
The government of India has drafted rules that will define how companies inside and outside of the country must handle ...
Read more

Japan and Philippines face Cyber Attacks from China

Japan and Philippines face Cyber Attacks from China
In recent days, Chinese-backed cyber attacks have been making headlines, with reports indicating a surge in espionage-driven cyber campaigns targeting ...
Read more

Ransomware Targeting Infrastructure Hits Telecom Namibia

Ransomware Targeting Infrastructure Hits Telecom Namibia
The telecommunications provider for the African nation of Namibia suffered a significant ransomware attack late last year, becoming a visible ...
Read more

How YouTube Channels Can Be Defended Against Cyber Threats

How YouTube Channels Can Be Defended Against Cyber Threats
In recent years, YouTube has become one of the most popular platforms for content creators, with millions of channels uploading ...
Read more

Third-Party Data Breach Limited to Treasury

Third-Party Data Breach Limited to Treasury
NEWS BRIEF The US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that the third-party breach that affected the US Treasury ...
Read more

Security Risk Advisors joins the Microsoft Intelligent Security Association

Security Risk Advisors joins the Microsoft Intelligent Security Association
Philadelphia, Pennsylvania, January 7th, 2025, CyberNewsWire Security Risk Advisors today announced it has become a member of the Microsoft Intelligent ...
Read more

Amit Yoran, Tenable CEO, Passes Away

Amit Yoran, Tenable CEO, Passes Away
The cybersecurity industry reacted with shock at the loss of Amit Yoran, the renowned cybersecurity executive who helmed several of ...
Read more

What exactly is Secure Access as a Service (SAaaS)?

What exactly is Secure Access as a Service (SAaaS)?
In today’s digital world, businesses and organizations are constantly grappling with securing their IT infrastructure, especially as remote work becomes ...
Read more

Why Small Business Can’t Rely Solely on AI to Combat Threats

Why Small Business Can’t Rely Solely on AI to Combat Threats
COMMENTARY As cybersecurity threats continue to surge, it has become crucial for small businesses to adopt proactive strategies to ensure ...
Read more

BLUECAT EDGE FOR COMPREHENSIVE PROTECTIVE DNS

BLUECAT EDGE FOR COMPREHENSIVE PROTECTIVE DNS
The increasing complexity of hybrid and multi-cloud environments, along with the rising frequency of sophisticated DNS-based attacks, has created significant ...
Read more