National Vulnerability Database Backlog NIST CISA
01
Jun
2024

NIST Hires A Contractor To Tackle National Vulnerability Database Backlog

The U.S. National Institute of Standards and Technology (NIST) has taken a big step to address the growing backlog of…

Hacker holding a bitcoin
01
Jun
2024

DMM Bitcoin warns that hackers stole $300 million in Bitcoin

Japanese crypto exchange DMM Bitcoin is warning that 4,502.9 Bitcoin (BTC), or approximately $308 million (48.2 billion yen), has been…

Jane Devry
31
May
2024

How to stop ransomware for good — and add the missing layer to ransomware resiliency

Attackers are going to do their best to breach you. And if they invest enough time and technology, they will…

Hacker Links Ticketmaster, Santander Data Leaks To Snowflake Breach
31
May
2024

Hacker Links Ticketmaster, Santander Data Leaks To Snowflake Breach

A threat actor has reportedly taken responsibility for recent data breaches involving Ticketmaster and Santander Bank, claiming they stole data…

CISA
31
May
2024

CISA warns of actively exploited Linux privilege elevation flaw

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added two vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog, including…

Jane Devry
31
May
2024

A Data Responsibility: Leveraging the Power of Trust to Drive Growth

By Nathan Vega, Vice President, Product Marketing & Strategy, Protegrity Companies are increasingly relying on data to drive business growth…

Snowflake compromised? Attackers exploit stolen credentials
31
May
2024

Snowflake compromised? Attackers exploit stolen credentials

Have attackers compromised Snowflake or just their customers’ accounts and databases? Conflicting claims muddy the situation. What is Snowflake? Snowflake…

Carrier LenelS2 NetBox Multiple Vulnerabilities
31
May
2024

Multiple Vulnerabilities Present In Carrier’s LenelS2 NetBox

Carrier has issued a serious product security advisory confirming the existence of several vulnerabilities in its LenelS2 NetBox access control…

Jane Devry
31
May
2024

A Practical Guide to Applying Zero Trust Principles to Active Directory for Microsoft On-Premises and Hybrid Environment Protection

Microsoft Active Directory (AD) is currently used by over 90% of large organizations. It functions as the ‘keys to the…

Navigating the Cultural Shift in Privileged Access Management (PAM)
31
May
2024

Navigating the Cultural Shift in Privileged Access Management (PAM)

31 May Navigating the Cultural Shift in Privileged Access Management (PAM) Posted at 14:04h in Blogs by Di Freeze Why…

Cyber Attack
31
May
2024

Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S.

May 31, 2024NewsroomNetwork Security / Cyber Attack More than 600,000 small office/home office (SOHO) routers are estimated to have been…

Copilot Recall Is ‘Dumbest Cybersecurity Move In A Decade’
31
May
2024

Copilot Recall Is ‘Dumbest Cybersecurity Move In A Decade’

A new Microsoft Windows feature dubbed Recall planned for Copilot+ PCs has been called a security and privacy nightmare by…