Month: February 2022

Join today’s leading executives online at the Data Summit on March 9th. Register here. This article was contributed by Randy Hopkins, VP of global systems engineering & enablement at Komprise. If data is the lifeblood of your organization — dictating the success of customer relationships, product launches, cross-selling and upselling, and employee productivity — then
0 Comments
ISRO’s Polar Satellite Launch Vehicle PSLV-C52 blasted off from Satish Dhawan Space Centre in Sriharikota at 5:59am on February 14. After the end of a 25-hour countdown, the launch vehicle carrying the Earth observation satellite EOS-04 and two co-passenger payloads — INSPIREsat-1 and INS-2TD — blasted off from the spaceport, marking the Indian space agency’s
0 Comments
A Nigerian rights group has asked the High Court to force the government to publish an agreement with Twitter that led to the restoration of the social media company’s services last month following a six-month ban. Nigeria suspended Twitter last June after the US company removed a post from President Muhammadu Buhari that threatened to punish
0 Comments
Technical details have been disclosed regarding a number of security vulnerabilities affecting Moxa’s MXview web-based network management system, some of which could be chained by an unauthenticated adversary to achieve remote code execution on unpatched servers. The five security weaknesses “could allow a remote, unauthenticated attacker to execute code on the hosting machine with the
0 Comments
Join today’s leading executives online at the Data Summit on March 9th. Register here. This article was contributed by Filip Martinsson, cofounder and chief operating officer of Moralis. It feels like you can’t move right now without hearing someone saying something about the metaverse. We have barely scratched the surface of 2022, and yet this
0 Comments
Spain’s National Police Agency, the Policía Nacional, said last week it dismantled an unnamed cybercriminal organization and arrested eight individuals in connection with a series of SIM swapping attacks that were carried out with the goal of financial fraud. The suspects of the crime ring masqueraded as trustworthy representatives of banks and other organizations and
0 Comments