
How the Demise of Third-Party Cookies Will Influence Data Security
The death of the third-party cookie is near. Introducing new privacy-friendly features and alternatives to increase data security.
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

The death of the third-party cookie is near. Introducing new privacy-friendly features and alternatives to increase data security.

An unsecured database consisting of 533 million Facebook users’ data was made publicly available last week and raises the necessity

aSince uncovering the Malware-as-a-service provider “Golden Chickens” back in 2018, we are carefully tracking the evolution of the Golden Chickens

The EU Council officially adopted conclusions for the new Cybersecurity Strategy. Check out our overview of the three focus areas!

QuoIntelligence analyzed China’s 14th Five-Year Plan draft, which sets goals and strategies for developing the country’s economy. Read our summary

IT security and rising cybercrime activities is a growing area of concern across many organizations. Here are ten essential areas,

DoH provides the benefit of communicating DNS information over an encrypted HTTPS connection but presents security issues for organizations.

In occasion of the #SaferInternetDay2021, we prepared a compilation of Top 3 Digital Threats organizations and their leaders should be

Supply chain attacks are on the rise in 2021. The recent SolarWind breach and COVID-19 are only exacerbating supply chain

The Brexit transition period has ended. On 24 December 2020 the EU and UK reached the Trade and Cooperation Agreement
Try searching our blog

US-Israel War With Iran Escalates With Increasing Attacks Against Vessels and Energy Infrastructure In the Gulf | Iranian MOIS Cyber Units Integrate Cybercrime Malware and Infrastructure into State Operations

US and Israeli Attacks Against Iran Trigger Regional Escalation, Disrupting Strategic Sectors | Iran-Linked Cyber Operations During the Current Escalation: Hacktivism, State Activity, and Broader Threat Dynamics

Russian-Speaking eCrime Threat Actor Leverages Commercial AI Services to Compromise Over 600 FortiGate Devices | US Supreme Court Strikes Down Trump’s Global Tariffs

UNC6201 Exploiting Zero-day in Dell RecoverPoint to Achieve Persistent Access | Wave of Sabotage Acts Target Italian Railway Network Amid Winter Olympics