NIST Cybersecurity Framework 2.0 Published
27
Feb
2024

NIST Cybersecurity Framework 2.0 Published

The newly updated Cybersecurity Framework (CSF 2.0) offers simplified cybersecurity guidance designed for everyone, from small nonprofits to large corporations….

How to Avoid Data Leaks
27
Feb
2024

How to Avoid Data Leaks

The Internet offers a convenient platform for sharing data, but it also brings the risk of data leaks. A data…

APT29 revamps its techniques to breach cloud environments
27
Feb
2024

APT29 revamps its techniques to breach cloud environments

Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five…

Forrester: Curb your AI enthusiasm
27
Feb
2024

Executive interview: David Wong, Thomson Reuters

Thomson Reuters has been innovating with artificial intelligence (AI) for a number of years. “We launched our very first natural…

Russian hackers
27
Feb
2024

Russian hackers hijack Ubiquiti routers to launch stealthy attacks

Russian military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory issued with…

Hackers Abuse 13,000 subdomains of Popular Brands In Phishing Campaign
27
Feb
2024

Hackers Abuse 13,000 subdomains of Popular Brands In Phishing Campaign

In a seemingly impossible act, nearly 8000 domains were discovered to be compromised by threat actors for malicious scam campaigns…

VIAVI enhances Observer Sentry's exposure and vulnerability analysis
27
Feb
2024

VIAVI enhances Observer Sentry’s exposure and vulnerability analysis

VIAVI Solutions announced the addition of traffic analysis capabilities to its Observer Sentry Software-as-a-Service-based threat exposure management solution. With traffic…

Hugging Face Vulnerability
27
Feb
2024

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

Feb 27, 2024NewsroomSupply Chain Attack / Data Security Cybersecurity researchers have found that it’s possible to compromise the Hugging Face…

Does third-party support make sense?
27
Feb
2024

Birmingham sets aside £25m for Oracle transformation

Birmingham City Council’s 2024/25 Budget setting for general fund revenue account report shows the council has set aside £25m this…

IDAT Loader used to infect a Ukraine entity in Finland with Remcos RAT
27
Feb
2024

IDAT Loader used to infect a Ukraine entity in Finland with Remcos RAT

IDAT Loader used to infect a Ukraine entity in Finland with Remcos RAT Pierluigi Paganini February 27, 2024 A new…

Lock Germany
27
Feb
2024

German state of Hessen says systems encrypted by ransomware

The German state of Hessen (Hesse) has been hit with a ransomware attack, causing the government to shut down IT…

Five Eyes Agencies Exposes Russian APT29 Cloud Attack Tactis
27
Feb
2024

Five Eyes Agencies Exposes Russian APT29 Cloud Attack Tactis

In a groundbreaking advisory, cybersecurity agencies from the Five Eyes intelligence alliance have detailed the sophisticated tactics, techniques, and procedures…