Largest Supply Chain Hack in history

Targeted Phishing Against a High-Value Open Source Maintainer This week, the largest Supply chain hack in history caused massive fallout. On September 8th, John Junon, a Javascript developer, received an email allegedly from npm (Node Package Manager) saying that all...

Fixing Vulnerabilities

Why Fixing Vulnerabilities After a Penetration Test is Critical for Security and User Privacy Penetration testing is an essential part of a robust cybersecurity strategy. It simulates real-world attacks to identify vulnerabilities before malicious actors can exploit...

EU General Court upholds EU-US Data Privacy Framework

On Wednesday 3 September 2025, the European Union General Court upheld the EU-US Data Privacy Framework (DPF), dismissing a legal challenge brought by French lawmaker Philippe Latombe.  In effect since 2023, the DPF was established to create a framework for...

Data Protection News Roundup – September

Welcome to September’s edition of our Data Protection monthly news roundup. Read on to find out what’s new in the world of data protection, as well as updates on all things iSTORM. Projects  August saw the continuation of several projects from the previous...

Securing AI Systems

Securing AI Systems: What is Artificial Intelligence (AI)? Artificial Intelligence (AI) refers to the development of computer systems that can perform tasks typically requiring human intelligence. These tasks include learning, reasoning, problem-solving, perception,...

Data Protection News Roundup – August

Welcome to August’s edition of our Data Protection monthly news roundup. Read on to find out what’s new in the world of data protection, as well as updates on all things iSTORM. Projects  July saw the continuation of several projects from the previous...
Verified by MonsterInsights