Jane Devry
18
Jul
2024

Navigating the FTC Safeguards Rule: A Guide for Auto Dealerships

Recent cybersecurity incidents affecting auto dealerships nationwide have underscored the growing importance of strong security measures. United States government organizations…

Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
18
Jul
2024

Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)

A recently fixed vulnerability (CVE-2024-36991) affecting Splunk Enterprise on Windows “is more severe than it initially appeared,” according to SonicWall’s…

SAPwned flaws in SAP AI core could expose customers' data
18
Jul
2024

SAPwned flaws in SAP AI core could expose customers’ data

SAPwned flaws in SAP AI core could expose customers’ data Pierluigi Paganini July 18, 2024 Researchers discovered security flaws in SAP…

Windows 11
18
Jul
2024

Microsoft fixes bug blocking Windows 11 Photos from starting

Microsoft has fixed a known issue preventing the Microsoft Photos app from starting on some Windows 11 22H2 and 23H2…

MediSecure Data Breach: 12.9 Million Australian Users’ Sensitive Data Hacked
18
Jul
2024

12.9 Million Australian Users’ Sensitive Data Hacked

In one of the largest cyber breaches in Australian history, MediSecure, a former provider of digital prescriptions, has revealed that…

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
18
Jul
2024

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Organizations

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making…

Jane Devry
18
Jul
2024

Business Email Compromise (BEC) Attacks are Deceptively Simple and Destructive: Protecting your Business

Business Email Compromise (BEC) is a social engineering scam where attackers impersonate legitimate business emails to defraud employees, partners, and…

Open-Source Tools
18
Jul
2024

New Threat Actor Uses Open-Source Tools for Widespread Attacks

Jul 18, 2024NewsroomOpen-Source / Cybercrime Unknown threat actors have been observed leveraging open-source tools as part of a suspected cyber…

Government trusted ‘abuser’ over the abused on Post Office scandal
18
Jul
2024

Government trusted ‘abuser’ over the abused on Post Office scandal

The government trusted the views of the Post Office over allegations by subpostmasters that they were being mistreated over unexplained…

Cybercriminals Heavily Preparing For 2024 Paris Olympic Games Based Attacks
18
Jul
2024

Cybercriminals Heavily Preparing For 2024 Paris Olympic Games Based Attacks

Major sporting events with massive online audiences, like the World Cup and Olympics, have become magnets for cyberattacks, which are…

Spotlight on DeepKeep.ai
18
Jul
2024

Spotlight on DeepKeep.ai – Cyber Defense Magazine

DeepKeep, the leading provider of AI-Native Trust, Risk, and Security Management (TRiSM), empowers large corporations that rely on AI, GenAI,…

Octo Tempest Attacking VMWare ESXi Servers Added new Ransom Tools
18
Jul
2024

Octo Tempest Attacking VMWare ESXi Servers Added new Ransom Tools

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems…