US Homeland Security names AI safety, security advisory board
29
Apr
2024

US Homeland Security names AI safety, security advisory board – Software

The US Homeland Security Department (DHS) announced a blue-ribbon board that includes the CEOs of OpenAI, Microsoft, Google parent Alphabet…

Apple renews talks with OpenAI
29
Apr
2024

Apple renews talks with OpenAI – Software

Apple has renewed discussions with OpenAI about using the startup’s generative AI technology to power some new features being introduced…

ICICI Bank exposed credit card data of 17000 customers
29
Apr
2024

ICICI Bank exposed credit card data of 17000 customers

ICICI Bank exposed credit card data of 17000 customers Pierluigi Paganini April 28, 2024 ICICI Bank, a major private bank…

AustralianSuper hunts for new CISO
28
Apr
2024

AustralianSuper hunts for new CISO – Training & Development – Security – Finance

AustralianSuper is on the hunt for a new chief information security officer to replace Mick Dunne who will leave for…

Chrome
28
Apr
2024

Google Chrome’s new post-quantum cryptography may break TLS connections

Some ​Google Chrome users report having issues connecting to websites, servers, and firewalls after Chrome 124 was released last week with…

US Post Office phishing sites get as much traffic as the real one
28
Apr
2024

US Post Office phishing sites get as much traffic as the real one

Security researchers analyzing phishing campaigns that target United States Postal Service (USPS) saw that the traffic to the fake domains…

Social engineering attacks target Okta customers to achieve a highly privileged role
28
Apr
2024

Okta warns of unprecedented scale in credential stuffing attacks on online services

Okta warns of unprecedented scale in credential stuffing attacks on online services Pierluigi Paganini April 28, 2024 Identity and access…

Credential Stuffing Attacks
28
Apr
2024

Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

Apr 28, 2024NewsroomCredential Stuffing / Data Breach Identity and access management (IAM) services provider Okta has warned of a spike…

Good Security Is About Iteration, Not Perfection.
28
Apr
2024

Good Security Is About Iteration, Not Perfection.

By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a…

Targeted operation against Ukraine exploited 7-year-old MS Office bug
28
Apr
2024

Targeted operation against Ukraine exploited 7-year-old MS Office bug

Targeted operation against Ukraine exploited 7-year-old MS Office bug Pierluigi Paganini April 28, 2024 A hacking campaign targeted Ukraine exploiting…

28
Apr
2024

Week in review: Two Cisco ASA zero-days exploited, MITRE breach, GISEC Global 2024

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Hackers backdoored Cisco ASA devices…

WP-Automatic Plugin Vulnerability: Warnings And Mitigation
28
Apr
2024

WP-Automatic Plugin Vulnerability: Warnings And Mitigation

Hackers have honed in on a critical WP-Automatic plugin vulnerability, aiming to infiltrate WordPress websites by creating unauthorized admin accounts, according…