Finally Finding the ‘Unknown Unknowns’ Across Your Entire Attack Surface
CISOs dread the “unknown unknowns” – the assets, vulnerabilities, misconfigurations and system weaknesses that the security team hasn’t detected and thus hasn’t secured. These blind...
Palo Alto adds software composition analysis to Prisma Cloud to boost open-source security
Palo Alto Networks has added a new software composition analysis (SCA) solution to Prisma Cloud to help developers safely use open-source software components. The vendor...
Security Best Practices: Cybersecurity & Compliance at Scale
Organizations can use security best practices to achieve compliance, ensure the protection of data assets, and scale their cybersecurity efforts.[…] Read More
Credit Card Fraud That Bypasses 2FA
Someone in the UK is stealing smartphones and credit cards from people who have stored them in gym lockers, and is using the two items...
Uber links cyberattack to LAPSUS$, says sensitive user data remains protected
Uber has linked its recent cyberattack to an actor (or actors) affiliated with the notorious LAPSUS$ threat group, responsible for breaching the likes of Microsoft,...
Risk counts for Cyber and here is why
Risk is one of those standard terms within cybersecurity that, when asked to define, many struggle to explain what risk is and how it applies...
American Airlines Breach Exposes Customer and Staff Information
An undisclosed number of people have been impacted Read More
Revolut Breach May Have Hit 50,000+ Customers
Major phishing risk as personal details are compromised Read More
Watch Out for These 3 Online Job Scams
If you recently found yourself looking for a new job, you are far from alone. According to the Institute of Labor Economics, more Canadians were seeking new employment...
Most common SAP vulnerabilities attackers try to exploit
Unpatched vulnerabilities, common misconfigurations and hidden flaws in custom code continue to make enterprise SAP applications a target rich environment for attackers at a time...