CISA & FBI Released Guide to Respond for DDoS Attacks
22
Mar
2024

CISA & FBI Released Guide to Respond for DDoS Attacks

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-State Information…

One-Click AWS Vulnerability -Takeover User's Management Panel
22
Mar
2024

One-Click AWS Vulnerability -Takeover User’s Management Panel

Tenable Research has identified a critical vulnerability within the AWS Managed Workflows for Apache Airflow (MWAA) service, which they have…

95% of companies face API security problems
22
Mar
2024

95% of companies face API security problems

Despite the critical role of APIs, the vast majority of commercial decision-makers are ignoring the burgeoning security risk for businesses,…

Hiring women could close tech skills gap, says tech professionals
22
Mar
2024

Everywoman announces 2024 Women in Tech Awards winners

Everywoman has announced the winners of its 2024 Everywoman in Technology Awards, sponsored by Bupa. Beginning in 2011, each year…

Apple M-Series Chip Vulnerability: Encryption Keys At Risk
22
Mar
2024

Apple M-Series Chip Vulnerability: Encryption Keys At Risk

An unpatchable vulnerability in Apple’s M-series chips has been reported. The Apple M-series chip vulnerability could potentially leak secret encryption…

167,500 Instances Found Vulnerable to Loop DoS Attack
22
Mar
2024

167,500 Instances Found Vulnerable to Loop DoS Attack

A sweeping vulnerability has been uncovered, leaving an estimated 167,500 instances across various networks susceptible to a Loop Denial of…

Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security
22
Mar
2024

Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security

Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly…

TinyTurla Evolved TTPs To Stealthly Attack Organizations
22
Mar
2024

TinyTurla Evolved TTPs To Stealthly Attack Organizations

Staying ahead of security measures and exploiting new vulnerabilities requires hackers to change their tactics. By doing so, they manage…

Shadow AI is the latest cybersecurity threat you need to prepare for
22
Mar
2024

Shadow AI is the latest cybersecurity threat you need to prepare for

Shadow IT – the use of software, hardware, systems and services that haven’t been approved by an organization’s IT/IT Sec…

CISA Reveals The One Industrial Control Systems Advisory
22
Mar
2024

CISA Reveals The One Industrial Control Systems Advisory

The Cybersecurity and Infrastructure Security Agency (CISA) has recently released an essential advisory on Industrial Control Systems (ICS). The CISA One…

Polycab IT Infrastructure Targeted in Ransomware Attack
22
Mar
2024

Polycab IT Infrastructure Targeted in Ransomware Attack

Polycab India Limited, a leading manufacturer of wires and cables, has reported a significant ransomware attack on its IT infrastructure….

Unsaflok Vulnerability Lets Hackers Open 3M+ Hotel Doors
22
Mar
2024

Unsaflok Vulnerability Lets Hackers Open 3M+ Hotel Doors

A group of cybersecurity researchers has uncovered several critical security flaws in the Saflok electronic RFID locks by Dormakaba. These…