DORA Compliance Strategy for Business Leaders
14
Jun
2024

DORA Compliance Strategy for Business Leaders

DORA Compliance Strategy for Business Leaders Pierluigi Paganini June 14, 2024 In January 2025, European financial and insurance institutions, their…

Servers
14
Jun
2024

Former IT employee gets 2.5 years for wiping 180 virtual servers

A former quality assurance employee of National Computer Systems (NCS) was sentenced to two years and eight months in prison…

Truist bank logo
14
Jun
2024

Truist bank confirms data breach

On Wednesday June 12, 2024, a well-known dark web data broker and cybercriminal acting under the name “Sp1d3r” offered a…

Official Olympics Paris 2024 Summer Olympic Games 3
14
Jun
2024

Over 300 Sites Impersonate Official Olympics Ticketing Site

As anticipation builds for the upcoming Paris 2024 Summer Olympic Games, security researchers and officials have observed an uptick in…

Windows
14
Jun
2024

CISA warns of Windows bug exploited in ransomware attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity Windows vulnerability abused in ransomware attacks as a…

Bot Farms
14
Jun
2024

Ukraine Detains Suspects Behind Bot Farms And Kremlin’s Propaganda Machinery

Ukraine’s Security Service (SBU) detained two individuals accused of aiding Russian intelligence in hacking the phones of Ukrainian soldiers and…

Servers
14
Jun
2024

Former IT staff gets 2.5 years for wiping 180 virtual servers

A former quality assurance employee of National Computer Systems (NCS) was sentenced to two years and eight months in prison…

Naveen Goud
14
Jun
2024

Ransomware payments work in some cases say experts

During the Central Banking Summer Meetings 2024 in London, a group of security analysts explored the contentious issue of ransomware…

Scattered Spider hackers switch focus to cloud apps for data theft
14
Jun
2024

Scattered Spider hackers switch focus to cloud apps for data theft

The Scattered Spider gang has started to steal data from software-as-a-service (SaaS) applications and establish persistence through creating new virtual machines….

Jane Devry
14
Jun
2024

A Bring Your Own Algorithms (BYOA) Approach to Crypto-Agility Addressing Quantum Threats

The anticipated advent of quantum computing will have a devastating impact on existing modes of asymmetric data encryption. It’s likely…

Google Privacy Sandbox
14
Jun
2024

Google’s Privacy Sandbox Accused of User Tracking by Austrian Non-Profit

Jun 14, 2024NewsroomPrivacy / Ad Tracking Google’s plans to deprecate third-party tracking cookies in its Chrome web browser with Privacy…

CISA Issues 20 Industrial Control Systems Advisories
14
Jun
2024

CISA Issues 20 Industrial Control Systems Advisories

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a comprehensive set of advisories to secure Industrial Control Systems…