News

  • Attack on Ukraine Telecoms Provider Caused by Compromised Employee Credentials

    PRIVACY PRIVACY Ukrtelecom claimed Russian hackers launched the attacks after compromising the credentials of an employee in an occupied area of the country Read More

    Read More

  • Electric Vehicle Chargers Hacked to Show Porn

    PRIVACY PRIVACY Screens on charge points in Isle of Wight council car parks hacked to show explicit content Read More

    Read More

  • Cyberweapons Arms Manufacturer FinFisher Shuts Down

    PRIVACY PRIVACY FinFisher has shut down operations. This is the spyware company whose products were used, among other things, to spy on Turkish and Bahraini political opposition. Read More

    Read More

  • LightBeam launches data privacy automation platform to streamline compliance

    PRIVACY PRIVACY Data privacy automation company LightBeam.ai has launched a new AI-powered data privacy automation platform designed to help organizations streamline compliance. LightBeam said its new offering takes an identity-centric approach to allow customers to automate compliance against a patchwork of existing and emerging privacy regulations such as GDPR, CPRA, HIPAA and PCI DSS. The…

    Read More

  • New threat group underscores mounting concerns over Russian cyber threats

    PRIVACY PRIVACY As fears mount over the prospects of a “cyberwar” initiated by the Russian government, the number of identified Russian threat actors also continues to climb. Last week CrowdStrike publicly revealed a Russia-nexus state-sponsored actor that it tracks as Ember Bear. CrowdStrike says that Ember Bear (also known as UAC-0056, Lorec53, Lorec Bear, Bleeding…

    Read More

  • DevSecOps build and test process

    PRIVACY PRIVACY In the previous article about the coding process, we covered developers using secure coding practices and how to secure the central code repository that represents the single source of truth. After coding is complete, developers move to the build and test processes of the Continuous Integration (CI) phase. These processes use automation to…

    Read More

  • What is the risk of retaliation for taking a corporate stance on Russia?

    PRIVACY PRIVACY Will your company’s decision and position on the Russian invasion of Ukraine or their continued presence in the Russian market (or exit from this market) carry with it the prospect of retaliation? The answer, unfortunately, is yes. Decisions, even to decide to do nothing and straddle the fence, carry  consequences. Even if the…

    Read More

  • Best advice for responding to today’s biggest cyber threats

    PRIVACY PRIVACY If you are like me, you follow world events and news such as Okta being breached by a group of teenagers to see if you need to change your defenses. This may not be a time to roll out new technologies or major changes to your network, as this will introduce other types…

    Read More

  • 10 top fuzzing tools: Finding the weirdest application errors

    PRIVACY PRIVACY When creating an application, programmers spend a lot of time anticipating what a user will need and how their application should react. The best programmers keep control using tight code while also planning for any contingency, but nobody can anticipate every possible action that a user might take. That is where fuzzing tools…

    Read More

  • Almost a Fifth of Global Firms Targeted with Spring4Shell

    PRIVACY PRIVACY New vulnerability exploited most widely in Europe Read More

    Read More

News, Advisories and much more

Exit mobile version