Five Steps to Overcoming Cyber Complacency
21
Mar
2024

Five Steps to Overcoming Cyber Complacency

[By Mike Toole, Head of IT and Security at Blumira] It’s no secret that news about breaches and cyberattacks emerge…

Competition For Top Cybersecurity Talent Is Fierce
21
Mar
2024

Role Model To Run In 2024 London Marathon

21 Mar Women In Cybersecurity: Role Model To Run In 2024 London Marathon This week in cybersecurity from the editors…

Malware stands out as the fastest-growing threat of 2024
21
Mar
2024

Malware stands out as the fastest-growing threat of 2024

93% of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47% last year,…

Firebase logo
21
Mar
2024

19 million plaintext passwords exposed by incorrectly configured Firebase instances

Three researchers scanned the internet for vulnerable Firebase instances, looking for personally identifiable information (PII). Firebase is a platform for…

Vendor Risk Assessments
21
Mar
2024

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

In today’s digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and…

The Loan Charge scandal explained: Everything you need to know
21
Mar
2024

IR35 reforms: IT contractors urged to reclaim tax they may have overpaid in off-payroll settlements

IT contractors found to be incorrectly operating outside of the IR35 off-payroll working rules during the 2019-2022 tax year have…

Vans Cyberattack
21
Mar
2024

Vans Cyberattack: Personal Info Exposed

Vans has notified its customers of a potential fraud or identity theft following the cyberattack on the parent company VF…

Ivanti fixed a critical EPM flaw that can result in RCE
21
Mar
2024

Ivanti urges customers to fix critical RCE flaw in Standalone Sentry

Ivanti urges customers to fix critical RCE flaw in Standalone Sentry solution Pierluigi Paganini March 21, 2024 Ivanti urges customers…

Pkl - Apple’s config lang
21
Mar
2024

Smuggling with JSON | HAHWUL

JSON은 YAML과 함께 자주 사용되는 포맷 중 하나입니다. K:V 형태의 단순한 구성이지만, JSON의 특성을 이용하면 데이터를 숨기고 Application의 잘못된 동작을…

Pokémon Resets Users Password Following Hacking Attempts
21
Mar
2024

Pokémon Resets Users Password Following Hacking Attempts

The Pokémon Company has taken decisive action to safeguard its users by resetting passwords after detecting unauthorized hacking attempts. This…

Application-Layer Loop DoS Attack - 300,000 Online Systems At Risk
21
Mar
2024

Application-Layer Loop DoS Attack – 300,000 Online Systems At Risk

Denial-of-service (DoS) attacks are usually exploited by hackers to interrupt regular network and website functioning, with motives of making money…

Attackers are exploiting JetBrains TeamCity flaw to deliver a variety of malware
21
Mar
2024

Attackers are exploiting JetBrains TeamCity flaw to deliver a variety of malware

Attackers are exploiting the recently patched JetBrains TeamCity auth bypass vulnerability (CVE-2024-27198) to deliver ransomware, cryptominers and remote access trojans…