SOC Analyst Burnout
10
Oct
2024

6 Simple Steps to Eliminate SOC Analyst Burnout

The current SOC model relies on a scarce resource: human analysts. These professionals are expensive, in high demand, and increasingly…

Afas leads the way with four-day work week in the Netherlands
10
Oct
2024

Afas leads the way with four-day work week in the Netherlands

In the run-up to Prinsjesdag, the traditional opening of the Dutch parliamentary year where the government presents its budget and…

U.S. CISA adds Ivanti CSA and Fortinet bugs to its Known Exploited Vulnerabilities catalog
10
Oct
2024

U.S. CISA adds Ivanti CSA and Fortinet bugs to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Ivanti CSA and Fortinet bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini October 10, 2024 U.S….

Hackers Exploiting zero-day Flaw in Qualcomm Chips to Attack Android Users
10
Oct
2024

Hackers Exploiting zero-day Flaw in Qualcomm Chips to Attack Android Users

Protect Websites & APIs from Malware Attack Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations,…

Internet Archive data breach, defacement, and DDoS: Users' data compromised
10
Oct
2024

Internet Archive data breach, defacement, and DDoS: Users’ data compromised

The Internet Archive has suffered a data breach, leading to the compromise of email addresses, screen names and bcrypt password…

What the datacentre industry would like to see from the government's planning reforms
10
Oct
2024

What the datacentre industry would like to see from the government’s planning reforms

The Starmer government lost little time in announcing a consultation on datacentre planning reforms, with more comprehensive, joined-up thinking favoured…

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code
10
Oct
2024

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability was found in Foxit PDF Reader,…

Qualys Enterprise TruRisk Management unifies asset inventory and risk factors
10
Oct
2024

Qualys Enterprise TruRisk Management unifies asset inventory and risk factors

Qualys launched the Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM). The solution enables CISOs and business leaders to manage…

Hyundai IPO: Insights On Cybersecurity Challenges
10
Oct
2024

Hyundai IPO: Insights On Cybersecurity Challenges

Hyundai’s recent IPO documents shed light on the company’s cybersecurity posture, revealing the challenges it has faced in protecting customer…

VMware NSX Vulnerabilities Allow Hackers To Execute Arbitrary Commands
10
Oct
2024

VMware NSX Vulnerabilities Allow Hackers To Execute Arbitrary Commands

VMware has issued a critical advisory (VMSA-2024-0020) detailing multiple vulnerabilities in its NSX and Cloud Foundation products. These vulnerabilities, identified…

Multiple VMware NSX Vulnerabilities Let Attackers Gain Root Access
10
Oct
2024

Multiple VMware NSX Vulnerabilities Let Attackers Gain Root Access

VMware has disclosed multiple vulnerabilities in its NSX product line that could potentially allow attackers to gain root access. The…

Mongolian Skimmer
10
Oct
2024

Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms

Oct 10, 2024Ravie LakshmananCybercrime / Malware Cybersecurity researchers have shed light on a new digital skimmer campaign that leverages Unicode…