iOS & Chrome Exploits
29
Aug
2024

State-Sponsored Hackers Repeatedly Using Same iOS & Chrome Exploits

Google’s Threat Analysis Group (TAG) has reported the discovery of multiple exploit campaigns targeting Mongolian government websites, spanning from November…

Study highlights secure software supply chain best practices
29
Aug
2024

Study highlights secure software supply chain best practices

The latest edition of Suse’s Securing the cloud report has found that almost every IT decision-maker polled is concerned about…

Innovator Spotlight: Beyond Identity
29
Aug
2024

Innovator Spotlight: Beyond Identity – Cyber Defense Magazine

At Black Hat 2024, I had the opportunity to speak with Jasson Casey, CEO of Beyond Identity, about their groundbreaking…

Innovator Spotlight: Zenity
29
Aug
2024

Innovator Spotlight: Zenity – Cyber Defense Magazine

Another innovative industry leader I had the pleasure of speaking with was Michael Bargury, Co-Founder and CTO of Zenity, a…

Women face greater risk of job displacement from automation
29
Aug
2024

Women face greater risk of job displacement from automation

Job automation is 40% more likely to affect women than men, according to research by Code First Girls and Tech…

Windows
29
Aug
2024

Windows 10 KB5041582 update released with 5 changes and fixes

​Microsoft has released the August 2024 preview update for Windows 10, version 22H2, with fixes for issues causing system freezes…

Beware! Cybercriminals Exploited Digital Marketing Tools to Launch Malicious Campaigns
29
Aug
2024

Hackers Exploited Digital Marketing Tools to Launch Malicious Campaigns

Researchers from Mandiant and Google have uncovered how cybercriminals are repurposing digital analytics and advertising tools to enhance their malicious…

29
Aug
2024

Spotlight on Sysdig – Cyber Defense Magazine

As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud…

Spotlight on Akto.ai
29
Aug
2024

Spotlight on Akto.ai – Cyber Defense Magazine

As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According…

Russian Hackers
29
Aug
2024

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Aug 29, 2024Ravie LakshmananBrowser Security / Vulnerability Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in…

AI hype hits reality roadblock
29
Aug
2024

AI hype hits reality roadblock

While there is no shortage of hype surrounding artificial intelligence (AI), businesses are beginning to realise just how difficult it…

Innovator Spotlight: ThreatLocker
29
Aug
2024

Innovator Spotlight: ThreatLocker – Cyber Defense Magazine

In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These…