In a shocking development, a major data breach has slipped through the radar of the central government, the CoWIN data entered by virtually every Indian who took a vaccine shot is freely available over the Telegram messenger
Read MorePristyn Care on Tuesday announced the introduction of its new AI-powered trainer Mira.AI. With Mira's arrival, Pristyn Care aims to change the training process for its care coordinators by incorporating highly engaging training modules, the company said in a statement
Read MoreThe report revealed that the exploitation of vulnerabilities by cyber criminals has increased by 55 per cent compared to 2021. Linux malware is also on the rise, targeting cloud workload devices; an estimated 90 per cent of public cloud instances run on Linux. The most common types of threats against Linux systems are botnets (47 per cent) coinminers (21 per cent), and backdoors (11 per cent)
Read MoreThe All India Institute of Medical Sciences, Delhi on Tuesday said that it tackled a fresh malware attack, but the attempt was successfully thwarted
Read MoreArete, a leading global cyber risk management company, released the first report in a series of Sector Ransomware Spotlights, in collaboration with cybersecurity research firm Cyentia. The report, focused on the healthcare sector, explores the most prolific ransomware families, ransom demand and payment trends, and the most impactful controls and mitigation tactics.
Read MoreArtificial Intelligence and Simulation technology aim to create environments that help transport patients into a space of virtual reality. VR is also becoming more conducive to patient care, enabling the medical industry to gain control over bigger global issues, epidemics, pandemics, and treatments
Read MoreElon Musk's brain-implant company Neuralink on Thursday said the U.S. Food and Drug Administration (FDA) had given the green light to its first-in-human clinical trial, a critical milestone after earlier struggles to gain approva
Read MoreMachine learning and AI are crucial for information security, as they can analyze large data sets and identify various types of threats, including malware and phishing attempts
Read More