Expert Insight: Breaking the glass firewall: Building a cybersecurity sisterhood
04
Apr
2024

Expert Insight: Breaking the glass firewall: Building a cybersecurity sisterhood

It’s no secret that the gender gap in cybersecurity is a worldwide issue, with women currently representing only 24% of…

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
04
Apr
2024

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

“That’s not nice, and it’s not a good norm,” says Schneider. She says that much of the US government’s slow…

Ivanti fixed a critical EPM flaw that can result in RCE
04
Apr
2024

Ivanti fixed for 4 new issues in Connect Secure and Policy Secure

Ivanti fixed for 4 new issues in Connect Secure and Policy Secure Pierluigi Paganini April 04, 2024 Ivanti addressed four…

Wordpress Plugin SQl Injection Exposes 1M Sites to Cyber Attack
04
Apr
2024

WordPress Plugin SQl Injection Exposes 1M Sites to Cyber Attack

Over a million WordPress websites have been at risk due to a critical SQL Injection vulnerability discovered in the popular…

Jackson County, Missouri, discloses a ransomware attack
04
Apr
2024

Jackson County, Missouri, discloses a ransomware attack

Jackson County, Missouri, discloses a ransomware attack Pierluigi Paganini April 04, 2024 Jackson County, Missouri, confirmed that a ransomware attack…

Mantis: Open-source framework that automates asset discovery, reconnaissance, scanning
04
Apr
2024

Mantis: Open-source framework that automates asset discovery, reconnaissance, scanning

Mantis is an open-source command-line framework that automates asset discovery, reconnaissance, and scanning. You input a top-level domain, and it…

Feds Stepping to Patch Years-old SS7 Vulnerability
04
Apr
2024

Feds Stepping to Patch Years-old SS7 Vulnerability

The FCC (Federal Communications Commission) seeks public input regarding measures by communications providers to address vulnerabilities in SS7 and Diameter…

Six steps for security and compliance in AI-enabled low-code/no-code development
04
Apr
2024

Six steps for security and compliance in AI-enabled low-code/no-code development

AI is quickly transforming how individuals create their own apps, copilots, and automations. This is enabling organizations to improve output…

Ivanti
04
Apr
2024

Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure

Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and…

Diabetes WA reveals data breach
04
Apr
2024

Diabetes WA reveals data breach – Security

Diabetes WA has disclosed a data breach affecting people who engaged with its telehealth service. In a breach notice posted…

Healthcare's cyber resilience under siege as attacks multiply
04
Apr
2024

Healthcare’s cyber resilience under siege as attacks multiply

In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare organizations. He…

76% of consumers don't see themselves as cybercrime targets
04
Apr
2024

76% of consumers don’t see themselves as cybercrime targets

67% of consumers across the globe are concerned about the security and privacy of AI, according to Bitdefender survey. AI…