Jane Devry
04
Jun
2024

Decoding Router Vulnerabilities Exploited by Mirai: Insights from Honeypot Data

Already in 2024, we successfully defended against 5.8 million Mirai-related attacks and saw a spike in honeypot activity related to…

PoC for Progress Telerik RCE chain released (CVE-2024-4358, CVE-2024-1800)
04
Jun
2024

PoC for Progress Telerik RCE chain released (CVE-2024-4358, CVE-2024-1800)

Security researchers have published a proof-of-concept (PoC) exploit that chains together two vulnerabilities (CVE-2024-4358, CVE-2024-1800) to achieve unauthenticated remote code…

NHS services at major London hospitals disrupted by cyber attack
04
Jun
2024

NHS services at major London hospitals disrupted by cyber attack

NHS services at London’s Guy’s and St Thomas’ and King’s College hospitals and other sites in the capital have been…

Tightening Water Cybersecurity is Now Imperative as Biden Administration Issues Urgent Warning to State Leaders
04
Jun
2024

Tightening Water Cybersecurity is Now Imperative as Biden Administration Issues Urgent Warning to State Leaders

By Robin Berthier, Co-Founder & CEO, Network Perception As the world grapples with escalating cyber threats, the Biden administration has…

Jane Devry
04
Jun
2024

Embracing the benefits of LLM securely

AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact…

Questions To Ask Before You Shop For Cyberinsurance
04
Jun
2024

Questions To Ask Before You Shop For Cyberinsurance

04 Jun Questions To Ask Before You Shop For Cyberinsurance Posted at 09:41h in Blogs by Di Freeze This week…

SailPoint Risk Connectors helps organizations identify and act on risks
04
Jun
2024

SailPoint Risk Connectors helps organizations identify and act on risks

SailPoint has announced a new offering on its Atlas platform, SailPoint Risk Connectors. As part of its Atlas platform, SailPoint…

Leadership accountability is key to diversifying talent
04
Jun
2024

Leadership accountability is key to diversifying talent

There is no shortage of agreement that diverse and inclusive teams create better business outcomes. And yet, in technology the…

Australian Government Orders Chinese Divestment After Northern Minerals Cyberattack
04
Jun
2024

Australian Government Orders Chinese Divestment After Northern Minerals Cyberattack

Australian Treasurer Jim Chalmers has mandated that several Chinese-linked investors divest their shares in Northern Minerals, a rare earth miner….

How weak credentials put MSPs & clients at risk
04
Jun
2024

How weak credentials put MSPs & clients at risk

Managed IT Service Providers (MSPs) and Managed Security Service Providers (MSSPs) are entrusted with safeguarding a vast amount of sensitive…

Hope is not a security plan, and neither is ignoring the risk
04
Jun
2024

Hope is not a security plan, and neither is ignoring the risk

The kaleidoscopic nature of the digital era means more dynamics are constantly being added to the cyber landscape. As an…

Relying on the Unreliable
04
Jun
2024

Relying on the Unreliable – Cyber Defense Magazine

The Hidden Costs of Facial Recognition Technology By Tinglong Dai Bernard T. Ferrari Professor of Business The Carey Business School…