Many popular websites still cling to password creation policies from 1985
12
Dec
2023

Many popular websites still cling to password creation policies from 1985

A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute…

Apache Struts 2 RCE Vulnerability
12
Dec
2023

New Critical RCE Vulnerability Discovered in Apache Struts 2

Dec 12, 2023NewsroomVulnerability / Software Security Apache has released a security advisory warning of a critical security flaw in the…

The 5 Things Every Leader Should Know for A Cyber-Vigilant Summer
12
Dec
2023

The 5 Things Every Leader Should Know for A Cyber-Vigilant Summer

By Michael Nizich, PhD, CISSP As another summer comes and goes and we start to prepare for another school year,…

eIDAS: EU’s internet reforms will undermine a decade of advances in online security
12
Dec
2023

eIDAS: EU’s internet reforms will undermine a decade of advances in online security

The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as…

UAE Government Portal Cyberattack
12
Dec
2023

Anonymous Collective Launches UAE Government Portal Cyberattack

The notorious hacktivist group, Anonymous Collective, targeted the United Arab Emirates’ government portal, claiming to have taken it offline. The…

The Embedded Systems and The Internet of Things
12
Dec
2023

The Embedded Systems and The Internet of Things

By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected…

Balancing AI advantages and risks in cybersecurity strategies
12
Dec
2023

Balancing AI advantages and risks in cybersecurity strategies

In this Help Net Security interview, Matt Holland, CEO of Field Effect, discusses achieving a balance for businesses between the…

iTnews Benchmark Awards - Deadline extended to 19th January - Benchmarking Change
12
Dec
2023

iTnews Benchmark Awards – Deadline extended to 19th January – Benchmarking Change

The iTnews Benchmark Awards are back for 2024, honouring Australia’s most successful and impactful IT projects. Following several requests, we have extended the…

Nemesis: Open-source offensive data enrichment and analytic pipeline
12
Dec
2023

Nemesis: Open-source offensive data enrichment and analytic pipeline

Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data (i.e., data…

WhatsApp, Slack, Teams, and other messaging platforms face constant security risks
12
Dec
2023

WhatsApp, Slack, Teams, and other messaging platforms face constant security risks

42% of businesses report employees with BYOD devices in business settings that use tools like WhatsApp have led to new…

12
Dec
2023

Understanding the world of AI and robotics at the FAIR – Partner Content

The Festival of AI + Robotics, the FAIR is a two-day event promising to educate, inspire and immerse attendees into…

ControlByWeb vulnerability
12
Dec
2023

Cyble Uncovers ControlByWeb Vulnerability Prompting CISA Alert

Prajitesh Singh, a senior researcher at Cyble Research & Intelligence Labs, detected a crucial Cross-Site Scripting Vulnerability (CVE-2023-6333) in ControlByWeb’s…