Cybersecurity image
23
Feb
2023

What is the Best Pen Testing Schedule for Your Development Cycle?

Pen testing is an essential part of secure application development; it helps find vulnerabilities before they can be exploited, ensures…

Isc2_cissp-issep
23
Feb
2023

Provide Your Feedback on the CISSP-ISSEP Exam Outline

[ This article was originally published here ] At (ISC)², we pride ourselves in our steadfast dedication to maintaining the…

23
Feb
2023

CISOs struggle with stress and limited resources

94% of CISOs report being stressed at work, with 65% admitting work-related stress issues are compromising their ability to protect…

PyPI Malware
23
Feb
2023

Python Developers Warned of Trojanized PyPI Packages Mimicking Popular Libraries

Feb 23, 2023Ravie LakshmananSoftware Security / Supply Chain Attack Cybersecurity researchers are warning of “imposter packages” mimicking popular libraries available…

23
Feb
2023

Gov picks former Service NSW chief to review MBR project – Strategy – Training & Development

Damon Rees, the former chief executive of Service NSW, has been appointed to lead the review of the federal government’s…

Hydrochasma hackers target medical research labs, shipping firms
23
Feb
2023

Hydrochasma hackers target medical research labs, shipping firms

A previously unknown threat actor named Hydrochasma has been targeting shipping and medical laboratories involved in COVID-19 vaccine development and treatments….

Microsoft ChatGPT usage virtually banned by JPMorgan Chase
23
Feb
2023

Microsoft ChatGPT usage virtually banned by JPMorgan Chase

Microsoft has made it official that it is going to introduce the services of its AI ChatGPT on all its…

23
Feb
2023

Insider threats must be top-of-mind for organizations facing layoffs

Amid uncertain economic conditions, the technology sector has been a hot topic of discussion in recent months due to the…

23
Feb
2023

The Good Guys warns of customer data leak – Security

The Good Guys is the latest company to reveal that some of its customer leaked in a historical data breach…

Fortinet
23
Feb
2023

Hackers now exploit critical Fortinet bug to backdoor servers

Threat actors are targeting Internet-exposed Fortinet appliances with exploits targeting CVE-2022-39952, an unauthenticated file path manipulation vulnerability in the FortiNAC…

Data Center Providers
23
Feb
2023

Cyber Attacks Targeting Data Center Providers

Several data center organizations were recently alerted by Resecurity regarding a malicious cyber campaign that has set its sights on…

23
Feb
2023

Xcitium ZeroDwell Containment isolates all unknown or suspect code entering an organization

Xcitium has unveiled its endpoint security solution, ZeroDwell Containment, for customers with or without legacy EDR products. Xcitium multi-patented technology…