Google Workspace Adds Client-Side Encryption to Gmail and Calendar
The move will facilitate compliance procedures for private and public sector organizations Read More
CISA Shares Advice to Improve Networks’ Monitoring and Hardening
The recommendations stem from a red team assessment conducted in 2022 Read More
Public SaaS Assets Are a Major Risk For Medium, Large Firms
The findings come from DoControl’s latest SaaS Security Threat Landscape report Read More
USN-5810-4: Git vulnerabilities
USN-5810-1 fixed several vulnerabilities in Git. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: Markus Vervier and Eric Sesterhenn discovered...
BlackLotus bootkit can bypass Windows 11 Secure Boot: ESET
A Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus is found to be capable of bypassing an essential platform security feature, UEFI Secure Boot, according to...
Top 10 open source software risks for 2023
Known vulnerabilities, compromise of legitimate package, and name confusion attacks are expected to be among the top ten open source software risks in 2023, according...
Record Number of Mobile Phishing Attacks in 2022
Endpoint security provider Lookout released its Global State of Mobile Phishing Report, which shows an unprecedented rate of mobile phishing attacks Read More
Fooling a Voice Authentication System with an AI-Generated Voice
A reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s Bank. Read More
Third party Cybersecurity risks in securing the supply chain
Some of the biggest prevailing challenges in the cybersecurity world over the last year have been those revolving around securing the software supply chain across...
Attacker Breakout Time Drops to Just 84 Minutes
Every second counts as threat actors accelerate lateral movement Read More