CISA Released Advisories to Mitigate LOTL Attack Techniques
09
Apr
2024

CISA Released Advisories to Mitigate LOTL Attack Techniques

In collaboration with international partners, the Cybersecurity and Infrastructure Security Agency (CISA) has released comprehensive advisories to mitigate Living Off…

#MIWIC2024: Illyana Mullins, Founder of WiTCH (Women in Tech and Cyber Hub CIC)
09
Apr
2024

#MIWIC2024: Illyana Mullins, Founder of WiTCH (Women in Tech and Cyber Hub CIC)

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…

Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks
09
Apr
2024

Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks

A Sandbox is a protective medium that blocks the entire system from any application accessing vulnerable resources.  Restrictive environments for…

91,000 LG TV Devices Vulnerable to Remote Takeover
09
Apr
2024

91,000 Smart LG TV Devices Vulnerable to Remote Takeover

Cybersecurity researchers from Bitdefender discovered critical vulnerabilities in LG TVs running webOS versions 4 through 7. These vulnerabilities could allow…

AI Can ‘Disproportionately’ Help Defend Against Cybersecurity Threats, Google CEO Sundar Pichai Says
09
Apr
2024

Microsoft Threat Intelligence Unveils Targets And Innovative Tactics Amidst Tax Season

09 Apr Microsoft Threat Intelligence Unveils Targets And Innovative Tactics Amidst Tax Season This week in cybersecurity from the editors…

SINEC Security Guard identifies vulnerable production assets
09
Apr
2024

SINEC Security Guard identifies vulnerable production assets

Production facilities are increasingly the target of cyberattacks. Industrial companies are therefore required to identify and close potential vulnerabilities in…

Public worried by police and companies sharing biometric data
09
Apr
2024

Public worried by police and companies sharing biometric data

More than half of the British public are worried about the sharing of biometric data, such as facial recognition, between…

Hackers Using Malware-Driven Scanning To Pinpoint Vulnerabilities
09
Apr
2024

Hackers Using Malware-Driven Scanning To Pinpoint Vulnerabilities

Attackers are now using malware-infected devices to scan target networks instead of directly scanning them. This approach helps them to…

The Role of Identity Data Management in Achieving CISA’S Strategic Goals
09
Apr
2024

The Role of Identity Data Management in Achieving CISA’S Strategic Goals

By Wade Ellery, Field Chief Technology Officer at Radiant Logic Cyber threats such as ransomware, zero-day exploits, phishing and supply…

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable
09
Apr
2024

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable

In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant…

How personalized phish training can thwart evolving cyberattacks
09
Apr
2024

The Threat That Can’t Be Ignored: CVE-2023-46604 in Apache ActiveMQ

[By Mike Walters, President and co-founder of Action1] In 2023, we witnessed numerous security vulnerabilities making headlines, with a few…

Akamai Shield NS53 protects on-prem and hybrid DNS infrastructure
09
Apr
2024

Akamai Shield NS53 protects on-prem and hybrid DNS infrastructure

Akamai launched Akamai Shield NS53, a product that protects on-premises (on-prem) Domain Name System (DNS) infrastructure from resource exhaustion attacks….