Securing Your SaaS Landscape: Closer Look at Disaster Recovery, Posture Management
31
Jan
2024

Closer Look at Disaster Recovery, Posture Management

Imagine you’re on a boat, navigating through the ever-changing waters of the tech world. SaaS applications are like the currents…

Gov agencies need to have a CISO
31
Jan
2024

Home Affairs elevates CIO to group manager – Training & Development

Home Affairs’ long-time CIO Radi Kovacevic has been elevated to lead the technology and major capability group on an acting…

US CISA added critical Apache RocketMQ flaw to its Known Exploited Vulnerabilities catalog
31
Jan
2024

CISA adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalog

CISA adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 31, 2024 U.S. Cybersecurity and…

Computer head guy holding his hands up
31
Jan
2024

Europcar denies data breach of 50 million users, says data is fake

Car rental company Europcar says it has not suffered a data breach and that shared customer data is fake after…

Ivanti VPN Flaws Exploited to Spread KrustyLoader Malware
31
Jan
2024

Ivanti VPN Flaws Exploited to Spread KrustyLoader Malware

Hackers exploit zero-day vulnerabilities in Ivanti VPN, deploying malware and cryptocurrency miners, with targets including Fortune 500 firms, gov’t agencies,…

Real-Life Case Study of How a $10B Enterprise Regained Control to Keep SaaS Data Secure
31
Jan
2024

Real-Life Case Study of How a $10B Enterprise Regained Control to Keep SaaS Data Secure

31 Jan The Spiraling SaaS Stack: Real-Life Case Study of How a $10B Enterprise Regained Control to Keep SaaS Data…

whispering secrets
31
Jan
2024

ChatGPT accused of breaking data protection rules

Italy’s Data Protection Authority (GPDP) has uncovered data privacy violations related to collecting personal data and age protections after an…

FBI
31
Jan
2024

FBI disrupts Chinese botnet by wiping malware from infected routers

The FBI has disrupted the KV Botnet used by Chinese Volt Typhoon state hackers to evade detection during attacks targeting…

Cyqur Launches A Game-Changing Data Encryption and Fragmentation Web Extension
31
Jan
2024

Change Your Password Day: Navigating the Shift Towards a Passwordless Future

The growth of our digital footprints has resulted in concerns about online identity security. Traditional passwords systems have become outdated,…

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs
31
Jan
2024

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions…

Retail’s Big Show: Reporting from the retail technology front line
31
Jan
2024

Retail’s Big Show: Reporting from the retail technology front line

Retail technology’s annual jamboree returned to New York City for Retail’s Big Show, organised by the National Retail Federation (NRF),…

CISA
31
Jan
2024

Vendors must secure SOHO routers against Volt Typhoon attacks

CISA has urged manufacturers of small office/home office (SOHO) routers to ensure their devices’ security against ongoing attacks attempting to hijack…