Beyond Fines: The Real Value of Achieving Cybersecurity Compliance
07
Oct
2024

Beyond Fines: The Real Value of Achieving Cybersecurity Compliance

Achieving cybersecurity compliance is often seen as a regulatory necessity, primary to avoid hefty fines and legal repercussions. However, the…

China's Salt Typhoon Hacks AT&T and Verizon, Accessing Wiretap Data: Report
07
Oct
2024

China’s Salt Typhoon Hacks AT&T and Verizon, Accessing Wiretap Data

China’s Salt Typhoon hacked AT&T, Verizon, and Lumen, compromising wiretap systems used in criminal investigations. The breach, linked to China,…

Cybersecurity Is The Biggest Challenge For Healthcare Providers
07
Oct
2024

Cybersecurity Is The Biggest Challenge For Healthcare Providers

Arguably the biggest single challenge for healthcare providers making their way through the Digital Age is especially near and dear to Vikram…

Action1 offers extended endpoint management capabilities for macOS devices
07
Oct
2024

Action1 offers extended endpoint management capabilities for macOS devices

Action1 announced its latest product release. As part of its platform enhancements, Action1 has introduced a new agent for macOS,…

FBCS data breach impacted 238,000 Comcast customers
07
Oct
2024

FBCS data breach impacted 238,000 Comcast customers

FBCS data breach impacted 238,000 Comcast customers Pierluigi Paganini October 07, 2024 238,000 Comcast customers were impacted by the FBCS…

Akesh Damaraju’s Cloud Security Masterclass: Combatting Tomorrow’s Cyber Threats
07
Oct
2024

Akesh Damaraju’s Cloud Security Masterclass: Combatting Tomorrow’s Cyber Threats

Akesh Damaraju’s new book, “Next-Gen Cloud Security: Pioneering Approaches for Modern Threats,” is a revolutionary guide to cloud security in…

Critical Vulnerabilities Expose Nearly 1 Million DrayTek Routers Globally
07
Oct
2024

Critical Vulnerabilities Expose Nearly 1 Million DrayTek Routers Globally

Critical security vulnerabilities exposed in DrayTek Vigor routers: Discover how to protect your network from these serious flaws. Learn about…

Linux systems targeted with stealthy “Perfctl” cryptomining malware
07
Oct
2024

Linux systems targeted with stealthy “Perfctl” cryptomining malware

Thousands of Linux systems are likely infected with the highly elusive and persistent “perfctl” (or “perfcc“) cryptomining malware and many…

Gorilla Botnet
07
Oct
2024

New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries

Oct 07, 2024Ravie LakshmananIoT Security / Botnet Cybersecurity researchers have discovered a new botnet malware family called Gorilla (aka GorillaBot)…

Why responsible AI is a business imperative
07
Oct
2024

Why responsible AI is a business imperative

The arrival of generative artificial intelligence (AI) prompted a great deal of discussion of speculative AI harms, with controversies over…

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code
07
Oct
2024

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that could allow attackers to execute remote…

APIs and Bot Attacks
07
Oct
2024

Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually

Organizations are losing between $94 – $186 billion annually to vulnerable or insecure APIs (Application Programming Interfaces) and automated abuse…