IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
15
Dec
2023

IT Sustainability Think Tank: How to bake green thinking into IT projects in 2024

The next year is going to be the year that sustainability becomes commonplace in IT projects. Cop28 has had many…

Crypto Hardware Wallet
15
Dec
2023

Crypto Hardware Wallet Ledger’s Supply Chain Breach Results in $600,000 Theft

Dec 15, 2023NewsroomCryptocurrency / Malware Crypto hardware wallet maker Ledger published a new version of its “@ledgerhq/connect-kit” npm module after…

IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
15
Dec
2023

IT Sustainability Think Tank: How enterprises can push sustainable innovation in 2024

In my last column, I explored some of the great steps that the UK technology sector has taken towards sustainability…

Snatch Ransomware Group Claims The FDVA Cyber Attack
15
Dec
2023

Ledger Cyberattack Leads To Loss Of USD 484,000

Ledger, a crypto wallet firm, recently fell victim to a security breach on December 14. The intrusion into Ledger’s Connect…

Flaws in pfSense firewall can lead to arbitrary code execution
15
Dec
2023

Flaws in pfSense firewall can lead to arbitrary code execution

Multiple flaws in pfSense firewall can lead to arbitrary code execution Pierluigi Paganini December 15, 2023 Security flaws in Netgate…

pfSense Firewall Software
15
Dec
2023

New Security Vulnerabilities Uncovered in pfSense Firewall Software

Dec 15, 2023NewsroomVulnerability / Software Security Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called…

IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
15
Dec
2023

IT Sustainability Think Tank: Green IT resolutions for the year ahead

A new report from the United Nations Convention for Climate Change (UNFCCC) finds national climate action plans remain insufficient to…

116 Malicious PyPI Packages Downloaded Over 10,000 Times
15
Dec
2023

116 Malicious PyPI Packages Downloaded Over 10,000 Times

A cluster of malicious Python projects has been identified in PyPI, the official Python PyPI package repository, which targets both Windows…

Hackers' Use of Remote Administration Tools to Control Systems
15
Dec
2023

Hackers’ Use of Remote Administration Tools to Control Systems

Recently, there has been a rise in incidences of hackers using “Remote Administration Tools” to control the infected system and…

Web Application Vulnerabilities
15
Dec
2023

Bug or Feature? Hidden Web Application Vulnerabilities Uncovered

Web Application Security consists of a myriad of security controls that ensure that a web application: Functions as expected. Cannot…

Government advised to overturn all Post Office scandal convictions
15
Dec
2023

Government advised to overturn all Post Office scandal convictions

The government has been advised to overturn all the convictions of the hundreds of subpostmasters wrongly accused in the Post…

Multiple Flaws in Dell PowerProtect Products Execute Commands
15
Dec
2023

Multiple Flaws in Dell PowerProtect Products Execute Commands

Multiple vulnerabilities have been discovered in Dell’s PowerProtect, which were associated with SQL injection, cross-site scripting (XSS), privilege escalation, command…