Watch out, experts warn of a critical flaw in Jenkins
26
Jan
2024

Watch out, experts warn of a critical flaw in Jenkins

Watch out, experts warn of a critical flaw in Jenkins Pierluigi Paganini January 26, 2024 Jenkins maintainers addressed several security…

Unified Communications Flaw Let Attackers Execute Arbitrary Code
26
Jan
2024

Unified Communications Flaw Let Attackers Execute Arbitrary Code

Cisco Unified Communications and Contact Center Solutions, known for their robustness, have recently been under scrutiny due to a critical…

How To Improve Security Capacities of The Internet of Things?
26
Jan
2024

How To Improve Security Capacities of The Internet of Things?

By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today….

Webinar
26
Jan
2024

Chinese Hackers Hijack Software Updates to Install Malware

In order to obtain unauthorized access and control, hackers take advantage of software vulnerabilities by manipulating updates. By corrupting the…

Malicious Ads on Google
26
Jan
2024

Malicious Ads on Google Target Chinese Users with Fake Messaging Apps

Jan 26, 2024NewsroomMalvertising / Phishing-as-a-service Chinese-speaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram…

What secure coding practices mean to modern cyber security
26
Jan
2024

Security Think Tank: What to expect in cyber this year

“In like a lion, out like a lamb” is an accurate description of 2023. It was a challenging start to…

Essential questions for developing effective human rights policies
26
Jan
2024

Essential questions for developing effective human rights policies

Growing environmental, social, and governance (ESG) expectations and expanding global regulation are propelling organizations to consider implementing a stand-alone human…

Cisco
26
Jan
2024

Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems

Jan 26, 2024NewsroomNetwork Security / Vulnerability Cisco has released patches to address a critical security flaw impacting Unified Communications and…

Public inquiry hears how Post Office security withheld evidence from people it suspected of theft
26
Jan
2024

Expert IT witness outsmarted an ‘aggressive’ Post Office to get to truth after inspection ‘madness’

The Post Office tried to pull the wool over IT expert’s eyes when it stopped him from properly inspecting its…

Pwn2Own Automotive 2024 Day 2
26
Jan
2024

Pwn2Own Automotive 2024 Day 2

Pwn2Own Automotive 2024 Day 2 – Tesla hacked again Pierluigi Paganini January 26, 2024 Researchers hacked the Tesla infotainment system…

Top 10 Ways to Avoid Cybersecurity Misconfigurations
26
Jan
2024

Top 10 Ways to Avoid Cybersecurity Misconfigurations

In the ever-evolving landscape of digital threats, cybersecurity mis-configurations have emerged as a significant vulnerability that can expose organizations to…

New infosec products of the week: January 26, 2024
26
Jan
2024

New infosec products of the week: January 26, 2024

Here’s a look at the most interesting products from the past week, featuring releases from 1Kosmos, Atakama, Onfido, Regula, Searchlight…