Opinion: Governments have the powers they said they wanted, so why won’t they use them?
https://www.itpro.com/security/encryption/the-encryption-stand-off-is-getting-weirder
Hackers have been uploading malicious content to Docker Hub via millions of imageless containers over the last three years, researchers found, prompting an alert for users of the service
The NCSC and CISA say that pro-Russia hacktivists are targeting under-protected industrial control systems
GitLab accounts are at serious risk of a maximum severity vulnerability that is already being exploited in the wild, according to CISA
Misuse of privileges and other human errors are rife, with two-thirds of breaches involving a non-malicious human action
Innovative deepfake technology is powering the next generation of social engineering attacks, – preventing deepfake attacks should be a priority for any security team
https://www.itpro.com/security/preventing-deepfake-attacks-how-businesses-can-stay-protected
Round-the-clock customer support could be the difference between success and failure in the event of IT disruption
https://www.itpro.com/security/what-makes-a-satisfied-customer
Dropbox’s e-signature service, Dropbox Sign, has been breached exposing usernames, email addresses, as well as sensitive authentication information
https://www.itpro.com/security/the-dropbox-data-breach-is-a-classic-case-of-breach-by-acquisition
A host of UK councils have been forced to pay compensation for data breaches over the last year, with some notable incidents costing thousands of pounds
Hackers are increasingly targeting remote desktop tools in their attacks, new research reveals, prompting warnings for enterprises globally
https://www.itpro.com/security/why-remote-desktop-tools-are-facing-an-onslaught-of-cyber-threats