European Union Ups Cybersecurity: Rules & Third-Party Assist
20
Jun
2024

European Union Ups Cybersecurity: Rules & Third-Party Assist

The European Union has introduced two critical regulatory frameworks: the Network and Information Security (NIS) Directive and the Digital Operational…

Fortra Warns of Hard-Coded Password Vulnerability in The Filecatalyst
20
Jun
2024

Fortra Warns of Hard-Coded Password Vulnerability in Filecatalyst

Fortra has issued a critical security advisory regarding a hard-coded password vulnerability in its FileCatalyst software, explicitly affecting the TransferAgent…

Hackers Weaponizing Vortex Meeting Software To Attack macOS Users
20
Jun
2024

Hackers Weaponizing Vortex Meeting Software To Attack macOS Users

Threat actors leverage meeting software applications and tools to penetrate weak security loopholes, infiltrate secure settings and organizations, steal highly…

Diamorphine Rootkit Exploiting Linux Systems In The Wild
20
Jun
2024

Diamorphine Rootkit Exploiting Linux Systems In The Wild

Threat actors exploit Linux systems because they are prevalent in organizations that host servers, databases, and other important resources.  Exploiting…

SquidLoader Malware
20
Jun
2024

Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations

Jun 20, 2024NewsroomMalware / Cyber Attack Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via…

CDK Global Cyberattack Cripples Car Sales Across US
20
Jun
2024

CDK Global Cyberattack Cripples Car Sales Across US

CDK Global, a provider of software solutions to auto dealerships across the United States, has fallen victim to a significant…

AMCOM Data Breach
20
Jun
2024

Alleged AMCOM Data Breach Exposes Military Docs On Dark Web

The U.S. Army Aviation and Missile Command (AMCOM), based at Redstone Arsenal, Alabama, has been spotlighted following an alleged data…

Naveen Goud
20
Jun
2024

Update on ransomware attacks on NHS, AMD and CDK Global

1.) Recently, the Qilin ransomware group, believed to originate from Russia, targeted three hospitals and a network, severely disrupting emergency…

eBook: CISO guide to password security
20
Jun
2024

eBook: CISO guide to password security

Password security has seen dramatic shifts driven by the escalation of cyber threats and technological advancements. This eBook covers: Best…

Improving OT cybersecurity remains a work in progress
20
Jun
2024

Improving OT cybersecurity remains a work in progress

Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still…

From passwords to passkeys: Enhancing security and user satisfaction
20
Jun
2024

From passwords to passkeys: Enhancing security and user satisfaction

In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data…

Most cybersecurity pros took time off due to mental health issues
20
Jun
2024

Most cybersecurity pros took time off due to mental health issues

Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick…