This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
• AI and machine learning • Attacks on supply chains and critical infrastructure • Cyber insurance • State-sponsored attacks and hacktivism • Deepfake t... more...
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... more...
Atlassian vydal softvérové opravy na riešenie štyroch kritických chýb vo svojom softvéri, ktoré by v prípade úspešného zneužitia mohli viesť k vzdialenému spusteniu kódu.
REGULATION (EU) 2021/887 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 20 May 2021 establishing the European Cybersecurity Industrial, Technology and Research Competen... more...show link
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1