OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment
22
Aug
2023

OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment

By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity…

DDoS Attacks in a Kubernetes Environment: Detection and Mitigation
22
Aug
2023

DDoS Attacks in a Kubernetes Environment: Detection and Mitigation

By Giri Radhakrishnan, Technical Product Marketing Manager, Tigera Distributed Denial-of-Service (DDoS) attack techniques are evolving, creating new risks and challenges…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
22
Aug
2023

US Military Targeted in Recent HiatusRAT Attack

A recent HiatusRAT campaign has been targeting a US military procurement system for reconnaissance, cybersecurity firm Lumen reports. Initially observed…

Python and Excel
22
Aug
2023

Microsoft Excel to let you run Python scripts as formulas

Microsoft is adding the Python programming language to Microsoft Excel, allowing users to create powerful functions for analyzing and manipulating…

Apache Ivy Injection Flaw
22
Aug
2023

Apache Ivy Injection Flaw Let Attackers Exfiltrate Sensitive Data

A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data…

Network Architecture Mapping Improves Security Posture and Saves Big Bucks
22
Aug
2023

Network Architecture Mapping Improves Security Posture and Saves Big Bucks

By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network,…

Training the Next Generation of Cybersecurity Professionals: 4 Keys to a Successful Internship Program
22
Aug
2023

Training the Next Generation of Cybersecurity Professionals: 4 Keys to a Successful Internship Program

By Ariel Weintraub, Head of Enterprise Cyber Security, MassMutual More than three million cybersecurity professionals are needed across the globe…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
22
Aug
2023

TP-Link Smart Bulb Vulnerabilities Expose Households to Hacker Attacks

Four vulnerabilities identified by academic researchers from Italy and the UK in the TP-Link Tapo L530E smart bulb and its…

Federated Learning Based IDS - Key Challenges and Future Paths
22
Aug
2023

Federated Learning Based IDS – Key Challenges and Future Paths

In today’s digital era, AI (Artificial Intelligence) and ML (Machine Learning) applications are one of the key developments.  But, with…

Macnica and Dragos Partner to Deliver OT Cybersecurity to CNI and Manufacturing Control Systems in Japan
22
Aug
2023

Aston University partners with ISACA to offer credentials in cybersecurity and risk management to graduates

ISACA announces a strategic partnership with the Cyber Security Innovation (CSI) Centre at Aston University to provide the next generation…

Juniper Networks Junos OS let Attacker Remotely Execute Code
22
Aug
2023

Juniper Networks Junos OS let Attacker Remotely Execute Code

Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability…

Datacentre management vulnerabilities leave public clouds at risk
22
Aug
2023

CBRE forecasts rise in European colocation capacity in H2 despite power supply constraints

The major European colocation hubs are expected to see a 17% year-on-year (YoY) increase in installed datacentre capacity by the…