keeping saas data under wraps
24
Jan
2024

Keeping SaaS Data Under Wraps

A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business…

Artificial Intelligence Heightens Ransomware Threat, UK Cyber Security Center Warns
24
Jan
2024

Artificial Intelligence Heightens Ransomware Threat, UK Cyber Security Center Warns

The report outlines that Artificial Intelligence (AI), currently utilized by cybercriminals, is lowering entry barriers for less experienced threat actors,…

PoC exploit for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)
24
Jan
2024

PoC exploit for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)

Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears…

Kasseika Ransomware
24
Jan
2024

Kasseika Ransomware Using BYOVD Trick to Disarms Security Pre-Encryption

The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack…

Cardiff University expands HPC cluster with Lenovo
24
Jan
2024

Cardiff University expands HPC cluster with Lenovo

Cardiff University has deployed 90 Lenovo ThinkSystem servers, with Logicalis technology, to support high-performance computing (HPC) research. The university’s Advanced…

Mass Exploitation of Ivanti VPN Exposes Networks to Hack Attacks
24
Jan
2024

Mass Exploitation of Ivanti VPN Exposes Networks to Hack Attacks

It was previously reported that Ivanti Connect Secure was vulnerable to an authentication bypass (CVE-2023-46805) and a command injection vulnerability…

Data Sanitization for End-Of-Use Assets
24
Jan
2024

Data Sanitization for End-Of-Use Assets

Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe…

Notorious Spyware Maker NSO Group Is Quietly Plotting a Comeback
24
Jan
2024

Notorious Spyware Maker NSO Group Is Quietly Plotting a Comeback

Then Hamas attacked Israel. Since then, NSO has been in a position to tangibly demonstrate the value of tools like…

Webinar
24
Jan
2024

Hackers Use SYSTEMBC Tool to Maintain Access

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK
24
Jan
2024

SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK

Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital…

Online Retailer BuyGoods.com Leaks 198GB of Internal and User PII, KYC data
24
Jan
2024

Global Retailer BuyGoods.com Leaks 198GB of Internal and User PII, KYC data

The staggering 198.3 gigabytes of misconfigured database contained more than 260,000 records including customer selfies with unredacted credit cards. Cybersecurity…

Nudge Security
24
Jan
2024

What is Nudge Security and How Does it Work?

Jan 24, 2024The Hacker NewsSaaS Security / Endpoint Security In today’s highly distributed workplace, every employee has the ability to…