Growing Enterprise Data is Creating Big Cybersecurity Risk
Buzz about big data permeated tech conversations in the mid-1990s, but people today don’t talk as much about big data anymore. It’s not that data…
Buzz about big data permeated tech conversations in the mid-1990s, but people today don’t talk as much about big data anymore. It’s not that data…
Jan 17, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed three security flaws in Planet Technology’s WGS-804HPT industrial switches that could be chained to…
It is widely acknowledged that CIOs (and other tech leaders such as CTOs) on average spend a relatively short time in their roles compared to…
Cyberattacks have become increasingly sophisticated, with more advanced technologies than ever at the disposal of cybercriminals. In 2025, cybercrime damages are expected to reach $10.5…
Jan 17, 2025Ravie LakshmananWeb Security / Botnet Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms…
The digital landscape is evolving rapidly, presenting security leaders with unprecedented challenges. As threats increase in volume and complexity, exacerbated by geopolitical tensions and cyber…
A leading provider of hardware authentication security keys, Yubico has recently disclosed a significant vulnerability in its PAM (Pluggable Authentication Module) software package. The flaw…
Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions of its native clients for Amazon WorkSpaces, Amazon AppStream 2.0,…
The UK government has expressed “reservations” about legislative proposals from Lord Tim Clement-Jones to improve the scrutiny of algorithmic decision-making tools in the public sector,…
Voice phishing, also known as vishing, represents a growing threat to organizations worldwide. Keepnet’s 2024 Vishing Response Report illuminates the alarming statistic that 70% of…
Jan 17, 2025Ravie LakshmananCybersecurity / Threat Intelligence Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that’s capable of Microsoft 365 accounts with an…
The mounting environmental impacts of generative artificial intelligence (GenAI) systems can be significantly reduced if businesses “choose the right model” for their use cases and…