Innovator Spotlight: Normalyze
23
Aug
2024

Innovator Spotlight: Normalyze – Cyber Defense Magazine

In today’s fast-paced digital world, data breaches have become the norm, not the exception. With data sprawled across cloud, on-prem,…

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware
23
Aug
2024

INE Security Launches Initiatives to Invest in the Education of Aspiring Cybersecurity Professionals

INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing…

Mike Lynch, acquitted in US trial and found dead at sea, was British tech trailblazer
23
Aug
2024

Mike Lynch, acquitted in US trial and found dead at sea, was British tech trailblazer – Software

Mike Lynch, the tech tycoon who died when his luxury yacht sank off Sicily, spent more than a decade building…

Innovator Spotlight: Harmonic Security
23
Aug
2024

Innovator Spotlight: Harmonic Security – Cyber Defense Magazine

The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in…

Innovator Spotlight: Upwind
23
Aug
2024

Innovator Spotlight: Upwind – Cyber Defense Magazine

The rapid adoption of cloud technology has led to an explosion in complexity and vulnerability within modern infrastructures. In 2022,…

Google to help build cyber protection for Australian infrastructure
22
Aug
2024

Google to help build cyber protection for Australian infrastructure – Security

Google and Australia’s national science agency CSIRO will join hands to develop digital tools that automatically detect and fix software…

Innovator Spotlight: AppSOC
22
Aug
2024

Innovator Spotlight: AppSOC – Cyber Defense Magazine

The rapid adoption of AI and Generative AI applications has unlocked tremendous potential, but it has also introduced significant security…

New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
22
Aug
2024

New Qilin tactics a ‘bonus multiplier’ for ransomware chaos

The cyber criminal Qilin ransomware gang seems to be upping the stakes in its ransomware attacks, stealing not just their…

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog
22
Aug
2024

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog Pierluigi…

Hardcoded Credential Vulnerability
22
Aug
2024

Hardcoded Credential Vulnerability Found in SolarWinds Web Help Desk

Aug 22, 2024Ravie LakshmananVulnerability / Network Security SolarWinds has issued patches to address a new security flaw in its Web…

SolarWinds fixed hardcoded credential issue in Web Help Desk
22
Aug
2024

SolarWinds fixed hardcoded credential issue in Web Help Desk

SolarWinds fixed a hardcoded credential issue in Web Help Desk Pierluigi Paganini August 22, 2024 SolarWinds fixed a hardcoded credential…

New NGate Android malware uses NFC chip to steal credit card data
22
Aug
2024

New NGate Android malware uses NFC chip to steal credit card data

A new Android malware named NGate can steal money from payment cards by relaying to an attacker’s device the data…