Prison for New Orleanian who Exploited Patients’ Stolen Data
Convict bought stolen data and used it to fraudulently obtain at least $200K Read More
A Parent’s Guide to TikTok
Finding someone who hasn’t heard of TikTok in 2022 would be quite the achievement. As one of the most popular social media platforms of the...
Anchore Enterprise software SCM platform adds SBOM capabilities
Anchore has released the latest version of its software SCM (supply chain management) solution, Anchore Enterprise, adding SBOM (software bill of materials) monitoring as an...
US and Canada Collaborate to Tackle Cybercrime
Neighboring countries meet to discuss how to combat cyber threats bilaterally Read More
#IMOS22: Leeza Garber Explains How to Hire the Human Element
Privacy & cybersecurity attorney, Leeza Garber, highlights the importance of hiring for behaviors in cybersecurity Read More
West Blocks Russia’s Access to Weather Data
Russia restricted over fears it may launch biological or chemical attack on Ukraine Read More
AvosLocker ransomware – what you need to know
AvosLocker is a ransomware-as-a-service (RaaS) gang which first appeared in mid-2021. It has since become notorious for its attacks targeting critical infrastructure in the United...
Vulnerabilities found in 250 HP printer models
HP has published various security alerts for more than 250 of its printer models. Hackers should be able to inject malicious code, denial-of-service (DoS) attacks to...
IriusRisk launches Open Threat Model standard to secure software development lifecycle
IriusRisk has launched a new Open Threat Model (OTM) standard to allow greater connectivity and interoperability between threat modeling and other parts of the software...
IBM service aims to secure multicloud operations
IBM’s new Unified Key Orchestrator lets customers integrate multiple security key-management systems into a single managed service that spans hybrid and multicloud environments. Read More
