News

  • Are SASE and Zero Trust the key for manufacturers grappling with IoT cyber risks?

    PRIVACY PRIVACY As manufacturers dash headlong into smart factory initiatives, the number of IoT devices operating in factories, warehouses, and across supply chain infrastructure is exploding. Manufacturers seek to utilize IoT in a range of places, be it video camera inspection devices on the assembly line, temperature sensors on refrigeration units, or maintenance telemetry sensors…

    Read More

  • Smishing Attack Led to Major Twilio Breach

    PRIVACY PRIVACY Firm tight-lipped on how many customers are affected Read More

    Read More

  • 7 best reasons to be a CISO

    PRIVACY PRIVACY The job of the CISO can be tough with its share of challenges, difficulties and complications. A CISO’s trials and tribulations include responsibility for protecting a business’s most valuable asset (its data) from an evolving cyberthreat landscape, traversing complex and strict regulatory requirements, balancing security with critical business needs, and juggling a security…

    Read More

  • How OKRs keep security programs on track

    PRIVACY PRIVACY When Michael Gregg joined the State of North Dakota as a security leader, he brought with him a concept he liked to use for keeping his security program on track: identifying objectives and key results (OKRs) and tracking progress against them. He says they had worked for him in the past, and he…

    Read More

  • Number of Firms Unable to Access Cyber-Insurance Set to Double

    PRIVACY PRIVACY Even those with policies may see coverage greatly reduced Read More

    Read More

  • Ransomware, email compromise are top security threats, but deepfakes increase

    PRIVACY PRIVACY While ransomware and business email compromise (BEC) are leading causes of security incidents for businesses, geopolitics and deepfakes are playing an increasing role, according to reports from two leading cybersecurity companies. VMware’s 2022 Global Incident Threat Response Report shows a steady rise in  extortionary ransomware attacks and BEC, alongside fresh jumps in deepfakes…

    Read More

  • Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in South Asia

    PRIVACY PRIVACY The groups’ attacks were reportedly relatively low in sophistication but persistent and well-resourced Read More

    Read More

  • Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and Afghanistan

    PRIVACY PRIVACY The phishing emails contained Microsoft Word documents that exploited the CVE-2017-11882 flaw Read More

    Read More

  • Hackers Exploit Open Redirect Vulnerabilities to Conduct LogoKit Phishing Campaigns

    PRIVACY PRIVACY LogoKit is based on JavaScript and can change logos and text on landing pages in real-time Read More

    Read More

  • NIST’s Post-Quantum Cryptography Standards

    PRIVACY PRIVACY Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0 nor 1, but something much more complicated. In theory, such a computer can solve problems too complex for conventional computers. Current quantum computers are…

    Read More

News, Advisories and much more

Exit mobile version