Multiple SonicWall Vulnerabilities Let Attackers Execute Remote Code
06
Dec
2024

Multiple SonicWall Vulnerabilities Let Attackers Execute Remote Code

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…

Windows, macOS users targeted with crypto-and-info-stealing malware
06
Dec
2024

Windows, macOS users targeted with crypto-and-info-stealing malware

Downloading anything from the internet is a gamble these days: you might think that you are downloading an innocuous app…

CapibaraZero Firmware Emerges As Affordable Flipper Zero Alternative For Pentesters
06
Dec
2024

CapibaraZero Firmware Emerges As Affordable Flipper Zero Alternative For Pentesters

The open-source CapibaraZero firmware has emerged as a cost-effective alternative to the popular Flipper Zero multi-tool. This new firmware targets…

Apple & OpenAI’s New Features: A First Look Through the Eyes of the US’ First Female CIO
06
Dec
2024

Apple & OpenAI’s New Features: A First Look Through the Eyes of the US’ First Female CIO

Even before my time in The White House, I was – and continue to be – captivated by the intersection…

Lessons from the Global IT Outage of July 19, 2024
06
Dec
2024

Lessons from the Global IT Outage of July 19, 2024

On Friday, July 19, 2024, the world experienced a massive IT outage that disrupted businesses, governments, and other users across…

Authorities Dismantled 50+ Servers Used By Criminal Marketplace
06
Dec
2024

Authorities Dismantled 50+ Servers Used By Criminal Marketplace

Europol has recently announced the successful takedown of a sophisticated online fraud network. The operation, spearheaded by German authorities and…

How AI Helps Security Teams at Samsara and Ekco Move Faster and Enhance Decision-Making
06
Dec
2024

How AI Helps Security Teams at Samsara and Ekco Move Faster and Enhance Decision-Making

Despite the enormous potential of AI, its impact on security operations has often fallen short, with teams grappling with privacy concerns,…

The Initial Engagement Process for Contracting with a vCISO
06
Dec
2024

The Initial Engagement Process for Contracting with a vCISO

Introduction In today’s fast-paced digital world, organizations face a myriad of cybersecurity challenges that demand expert guidance and strategic oversight….

Podcast: Storage and AI training, inference, and agentic AI
06
Dec
2024

Podcast: Storage and AI training, inference, and agentic AI

In this podcast, we look at storage and artificial intelligence (AI) with Jason Hardy, chief technology officer for AI with…

Shifting The Focus: From Compliance to Secops In Supply Chain Security
06
Dec
2024

Shifting The Focus: From Compliance to Secops In Supply Chain Security

There are two main reasons why supply chain attacks are on the increase. First, there is a general trend of…

How to choose secure, verifiable technologies?
06
Dec
2024

How to choose secure, verifiable technologies?

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable…

Rockwell Automation Warns of Multiple Code Execution Vulnerabilities in Arena
06
Dec
2024

Rockwell Automation Warns of Multiple Code Execution Vulnerabilities in Arena

Rockwell Automation has issued a critical security advisory addressing multiple remote code execution (RCE) vulnerabilities discovered in its Arena® software….