Author: Cybernoz

Hackers Use Artificial Intelligence to Create Sophisticated Social Engineering Attacks
09
Dec
2024

Hackers Use Artificial Intelligence to Create Sophisticated Social Engineering Attacks

The Federal Bureau of Investigation (FBI) has issued a warning about a growing trend in cybercrime, hackers leveraging generative artificial…

Who handles what? Common misconceptions about SaaS security responsibilities
09
Dec
2024

Who handles what? Common misconceptions about SaaS security responsibilities

In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments,…

Starbucks Third-party Ransomware Attack, Termite Group Claims Credit
09
Dec
2024

Starbucks Third-party Ransomware Attack, Termite Group Claims Credit

A ransomware attack on supply chain technology provider Blue Yonder has caused significant disruptions for its clients, including Starbucks, BIC,…

WAF Vulnerability
09
Dec
2024

WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies

A recently discovered security vulnerability dubbed “BreakingWAF” in the configuration of web application firewall (WAF) services has left numerous Fortune…

Top cybersecurity books for your holiday gift list
09
Dec
2024

Top cybersecurity books for your holiday gift list

The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book…

09
Dec
2024

Businesses plagued by constant stream of malicious emails

36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion…

Optus sells Uecomm to Superloop for $17.5m
09
Dec
2024

Optus sells Uecomm to Superloop for $17.5m – Telco/ISP

Optus is to sell its subsidiary Uecomm to Superloop for $17.5 million following a “strategic review”. The deal will see…

It Takes a Village – and a Lot of Time – to Manage Data Security and Compliance
09
Dec
2024

It Takes a Village – and a Lot of Time – to Manage Data Security and Compliance

For security teams, sensitive content is generally at the centre of what they need to protect in their corporate IT…

Versent Achieves the AWS Digital Sovereignty Competency
09
Dec
2024

Versent Achieves the AWS Digital Sovereignty Competency – Partner Content – Promoted Content

Versent an Amazon Web Services Premier Partner announced today that they have achieved the Amazon Web Services (AWS) Digital Sovereignty…

US House to vote on billions to remove Chinese telecoms equipment
09
Dec
2024

US House to vote on billions to remove Chinese telecoms equipment – Security – Telco/ISP

The US House of Representatives is set to vote on an annual defence bill that includes just over US$3 billion…

Palantir, Anduril sign partnership for AI training in defence
09
Dec
2024

Palantir, Anduril sign partnership for AI training in defence – Software

Data analytics firm Palantir Technologies and defence tech company Anduril Industries have partnered to use defence data for artificial intelligence…

Macquarie University creates CTO role
08
Dec
2024

Macquarie University creates CTO role – Security – Training & Development

Macquarie University is seeking a chief technology officer to front its new IT operating model MQIT. Macquarie University campus iStockPhoto…