Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Network detection and response in the modern eraIn this Help…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Network detection and response in the modern eraIn this Help…
In the current digital age, sustaining data integrity has become a critical concern. The rapid digital transformation has enabled faster collection of huge volume of…
The cloud and hosting provider Leaseweb suffered a security breach that impacted some “critical” systems of the company. Global hosting and cloud services provider Leaseweb…
In today’s rapidly evolving technological landscape, virtualization has emerged as a cornerstone of modern IT infrastructure. As businesses strive to optimize their operations, enhance resource…
In today’s digitized landscape, where technology connects us in ways we couldn’t have imagined just a few decades ago, there’s a lurking shadow that threatens…
Pôle emploi, the French government employment agency suffered a data breach that impacted 10 million individuals. The French government employment agency Pôle emploi suffered a data…
KEY FINDINGS Camera injection attacks are a new threat to facial recognition security. Cybercriminals can exploit weaknesses in facial recognition systems by injecting manipulated video…
Welcome to the 6th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners.…
“The government needs to stop these companies from packaging and selling our personal information,” US senator Ron Wyden of Oregon told 404 Media in a…
Security consulting giant Kroll disclosed a data breach resulting from a SIM-swapping attack against one of its employees. Security consulting firm Kroll revealed that a SIM-swapping attack against…
The chase to catch cybercriminals just got speedier suggested a new report. Highlighting the median cyber attack dwell time, it was found that this duration…
The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the tool to spawn new variants. Russian cybersecurity company…