CMG

BLOG / NEWS

Jaguar Confirms Data Stolen in Breach, Staff Told to Stay Home For Another Week

Jaguar Confirms Data Stolen in Breach, Staff Told to Stay Home For Another Week

Jaguar Land Rover (JLR) has confirmed that some data was compromised in the cyberattack that occurred last month, even as…
Read More
New Raven Stealer Malware Hits Browsers for Passwords and Payment Data

New Raven Stealer Malware Hits Browsers for Passwords and Payment Data

Recent research by the Lat61 Threat Intelligence Team at Point Wild, led by Onkar R. Sonawane, has uncovered a new…
Read More
Hackers claim they stole 1.5 billion Salesforce records from hundreds of companies in major hack – but are they telling the truth?

Hackers claim they stole 1.5 billion Salesforce records from hundreds of companies in major hack – but are they telling the truth?

Months after the initial breach, ShinyHunters have disclosed further details about the attack, claiming to have stolen 1.5 billion records…
Read More
Microsoft Warns Dangerous PipeMagic Backdoor is Being Disguised as ChatGPT Desktop App – here’s what we know

Microsoft Warns Dangerous PipeMagic Backdoor is Being Disguised as ChatGPT Desktop App – here’s what we know

Microsoft has warned about a malicious application circulating online that masquerades as a ChatGPT desktop app. This application contains a…
Read More
Agentic AI in Contact Centers: The Next Big Shift in Customer Experience

Agentic AI in Contact Centers: The Next Big Shift in Customer Experience

Agentic AI can play a significant role in enhancing the efficiency of contact centers. By integrating this technology, organizations can…
Read More
All About DeepSeek — The Chinese AI Startup Challenging US Big Tech

All About DeepSeek — The Chinese AI Startup Challenging US Big Tech

DeepSeek, a relatively unknown Chinese AI startup, has sent shockwaves through Silicon Valley with its recent release of cutting-edge AI…
Read More
Google Says Hackers Stole its Customers’ Data by Breaching its Salesforce Database

Google Says Hackers Stole its Customers’ Data by Breaching its Salesforce Database

Google has announced a recent security incident involving the unauthorized access of customer information from one of its databases. The…
Read More
Cybersecurity Credential Stuffing Attacks are on the Rise: Here’s What All Businesses Need to Know

Cybersecurity Credential Stuffing Attacks are on the Rise: Here’s What All Businesses Need to Know

Businesses are increasingly vulnerable to credential stuffing attacks, a type of cyber threat that can result in significant financial losses…
Read More
Cloud IT Outsourcing For Business Resilience In 2025

Cloud IT Outsourcing For Business Resilience In 2025

Cloud computing is becoming a key factor in strengthening business resilience in 2025. Cloud-based IT outsourcing allows companies to scale,…
Read More
Where Does Vulnerability Assessment and Penetration Testing Fit in Your Security Strategy

Where Does Vulnerability Assessment and Penetration Testing Fit in Your Security Strategy

New software vulnerabilities are emerging at an alarming rate, creating opportunities for cybercriminals to breach systems. This flood of security…
Read More
1 2 3 5