Training the Next Generation of Cybersecurity Professionals: 4 Keys to a Successful Internship Program
22
Aug
2023

Training the Next Generation of Cybersecurity Professionals: 4 Keys to a Successful Internship Program

By Ariel Weintraub, Head of Enterprise Cyber Security, MassMutual More than three million cybersecurity professionals are needed across the globe…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
22
Aug
2023

TP-Link Smart Bulb Vulnerabilities Expose Households to Hacker Attacks

Four vulnerabilities identified by academic researchers from Italy and the UK in the TP-Link Tapo L530E smart bulb and its…

Federated Learning Based IDS - Key Challenges and Future Paths
22
Aug
2023

Federated Learning Based IDS – Key Challenges and Future Paths

In today’s digital era, AI (Artificial Intelligence) and ML (Machine Learning) applications are one of the key developments.  But, with…

Macnica and Dragos Partner to Deliver OT Cybersecurity to CNI and Manufacturing Control Systems in Japan
22
Aug
2023

Aston University partners with ISACA to offer credentials in cybersecurity and risk management to graduates

ISACA announces a strategic partnership with the Cyber Security Innovation (CSI) Centre at Aston University to provide the next generation…

Juniper Networks Junos OS let Attacker Remotely Execute Code
22
Aug
2023

Juniper Networks Junos OS let Attacker Remotely Execute Code

Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability…

Datacentre management vulnerabilities leave public clouds at risk
22
Aug
2023

CBRE forecasts rise in European colocation capacity in H2 despite power supply constraints

The major European colocation hubs are expected to see a 17% year-on-year (YoY) increase in installed datacentre capacity by the…

22
Aug
2023

PeopleCert Data Breach, Sensitive Information Leaked

An individual self-identifying as “temp221212” on the dark web forum has taken responsibility for the PeopleCert data breach. The breach…

Hacker Conversations: Interview Cris Thomas, (Space Rogue) from Lopht Heavy Industries
22
Aug
2023

Hacker Conversations: Cris Thomas (AKA Space Rogue) From Lopht Heavy Industries

Researchers are hackers. In the hat color terminology, there are Blackhat, Whitehat and various shades of Greyhat hackers. Today, the…

Cato Networks: Challenger in Gartner Magic Quadrant for Single-Vendor SASE
22
Aug
2023

Cato Networks: Challenger in Gartner Magic Quadrant for Single-Vendor SASE

Cato Networks has announced today that Gartner, Inc. has recognised the company as a Challenger in the Gartner® Magic Quadrant™…

TP-Link Smart Bulb Users at Risk of WiFi Password Theft
22
Aug
2023

TP-Link Smart Bulb Users at Risk of WiFi Password Theft

The vulnerabilities of the smart bulb were identified by cybersecurity researchers from Italy and the United Kingdom. Summary Security researchers…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
22
Aug
2023

Australian Energy Software Firm Energy One Hit by Cyberattack

Energy One, an Australian company that provides software products and services to the energy sector, has been hit by a…

Met Police data platform £64m over budget
22
Aug
2023

Met Police data platform £64m over budget

The Metropolitan Police Service’s integrated record management system is nearly £60m over budget, and still facing major teething problems, with…