U.S. Lawmakers Probe TP-Link Over Chinese Cyberattacks Risk
16
Aug
2024

U.S. Lawmakers Probe TP-Link Over Chinese Cyberattacks Risk

Two U.S. lawmakers have called on the Biden administration to investigate TP-Link Technology Co. Ltd., a major Chinese manufacturer of…

US DOJ Considers Breakingup Google Following Antitrust Case
16
Aug
2024

US DOJ Considers Breakingup Google Following Antitrust Case

The U.S. Department of Justice (DOJ) is contemplating a historic move to break up Alphabet Inc.’s Google following a significant…

Naveen Goud
16
Aug
2024

Can a CIO Avoid Cyber Threats and Data Breaches?

In today’s digital landscape, Chief Information Officers (CIOs) face unprecedented challenges in safeguarding their organizations from cyber threats and data…

AutoCanada Data Breach Confirmed, Impact Assessment Underway
16
Aug
2024

AutoCanada Data Breach Confirmed, Impact Assessment Underway

AutoCanada Inc., a leading North American multi-location automobile dealership group, reported that it had identified a significant cybersecurity incident affecting…

Naveen Goud
16
Aug
2024

List of vulnerable states in America that are vulnerable to Cyber Attacks

According to a recent study by Kiteworks, a security and compliance firm, Colorado has emerged as the most vulnerable state…

University Of Winnipeg Data Breach Far Worse Than Thought
16
Aug
2024

University Of Winnipeg Data Breach Far Worse Than Thought

The investigation into the University of Winnipeg data breach has now concluded, and the University has updated its notification to…

CEO Cybersecurity Strategies For Key Take Down Services
16
Aug
2024

CEO Cybersecurity Strategies For Key Take Down Services

As cyber threats become increasingly sophisticated, the need for effective cyber hygiene has never been more critical. CEOs are at…

Business and tech consolidation opens doors for cybercriminals
16
Aug
2024

Business and tech consolidation opens doors for cybercriminals

Cyber threats continued to intensify in the first half of 2024 as cybercriminals exploited security gaps from growing business and…

Authentik: Open-source identity provider - Help Net Security
16
Aug
2024

Authentik: Open-source identity provider – Help Net Security

Authentik is an open-source identity provider designed for maximum flexibility and adaptability. It easily integrates into existing environments and supports…

New infosec products of the week: August 16, 2024
16
Aug
2024

New infosec products of the week: August 16, 2024

Here’s a look at the most interesting products from the past week, featuring releases from ClearSale, Guardio, Ivanti, Resecurity, and…

Kubernetes Vulnerability Command Injection
16
Aug
2024

Kubernetes Vulnerability Exposes Clusters to Command Injection Attacks

A recently discovered vulnerability in Kubernetes has raised significant concerns within the cybersecurity community. Akamai researcher Tomer Peled identified a…

Zimbra XSS Flaw Allows Hackers to Execute Malicious JavaScript Code
16
Aug
2024

Zimbra XSS Flaw Allows Hackers to Execute Malicious JavaScript Code

A critical security flaw has been discovered in the Zimbra Collaboration Suite (ZCS), potentially allowing hackers to execute malicious JavaScript…