Researchers from ETH Zurich have uncovered significant security vulnerabilities in several widely used end-to-end encrypted (E2EE) cloud storage services. The cryptographic flaws could allow attackers to bypass encryption, compromise file confidentiality, tamper with data, or even inject unauthorised files into users’ storage. The study analysed five E2EE cloud storage providers—Sync, pCloud, Seafile, Icedrive, and Tresorit—which… Read more »
NordVPN has integrated post-quantum cryptography into its Linux application, marking an early adoption of this technology in the consumer VPN market. This move addresses growing concerns about the potential for future quantum computers to break current encryption standards, potentially compromising sensitive data. The update, released in late September, introduces post-quantum cryptography to NordVPN’s Nordlynx protocol.… Read more »
The internet was built in more simple, innocent times and was seized on by a curious mixture of visionaries, educators, academics and technology geeks as a way to democratise the distribution of information. Decades later, the protocols that govern this interconnected network of private networks remain much the same, but the makeup of the inhabitants… Read more »
As organisations worldwide continue to grapple with an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial. Ahead of Cyber Security & Cloud Expo Europe, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shed light on the shifts in cybersecurity over the past five years and offers valuable insights… Read more »
As businesses increasingly rely on cloud technologies, ensuring secure and efficient global connectivity is paramount. GNX, a provider of global internet and private connectivity solutions, is addressing this challenge head-on. Ahead of Cyber Security & Cloud Expo Europe, CloudTech caught up with Rick Mur, Co-Founder & CTO of GNX, to discuss the evolving landscape of… Read more »
Tech giant Google has been cooperating with Australia’s national science agency, the Commonwealth Scientific and Industrial Research Organisation (CSIRO), to mitigate the spread of digital risks. The two parties are focused on devising revolutionary digital tools for hospitals, defence organisations, and energy providers, which are considered critical infrastructure operators. These tools would be able to… Read more »
The UAE hopes to introduce three new policies to enhance the country’s existing cybersecurity framework. According to the Emirates News Agency, the proposed policies will concern the domains of cloud computing, data security, IoT security, and cybersecurity operations centres. Even though the inner workings of these rules are not yet known, it is safe to… Read more »
Google Cloud serverless projects are being used by a Latin American financially motivated threat group, codenamed FLUXROOT, to orchestrate credential phishing campaigns, the The Hacker News has reported. This event is not isolated, as numerous malefactors in cyberspace are exploiting cloud computing services for malicious objectives. Thus, IT and cybersecurity professionals are facing a pressing… Read more »
Multinational technology conglomerate Alphabet has beaten second-quarter revenue and profit analyst estimates. The company’s performance was driven by a rise in digital advertising sales and healthy demand for its cloud computing services, though it cautioned that capital expenses would remain high for the year. Reuters reported that the popularity of the Paris Olympics and elections… Read more »
Cybersecurity giant CrowdStrike says its recent software update has caused a massive global tech outage, impacting some 8.5 million Microsoft devices worldwide. While still affecting less than one per cent of all Windows computers in use, the incident has significantly impacted several vital sectors, demonstrating how far-reaching modern digital infrastructure can be. In a blog… Read more »