Discord Hacking
17
Oct
2023

A Playground for Nation-State Hackers Targeting Critical Infrastructure

Oct 17, 2023NewsroomMalware / APT In what’s the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
17
Oct
2023

Prove Identity Snags $40M Funding for ID Verification Tech

Prove Identity, a late-stage startup with roots in the ecommerce mobile payments space, on Tuesday closed a $40 million funding…

Android figure running from a volcano
17
Oct
2023

SpyNote Android malware spreads via fake volcano eruption alerts

The Android ‘SpyNote’ malware was observed in attacks targeting Italy using a fake ‘IT-alert’ public alert service that infected visitors…

Key Considerations When Hiring a Chief Information Security Officer
17
Oct
2023

Ten 10 essential tips to bolster information security

In today’s business landscape, information security is of paramount importance. With nearly all business operations going digital, companies are increasingly…

International Cyber Expo Commits to Highlighting Importance of Wellbeing in Cybersecurity
17
Oct
2023

IT Admins Are Just as Guilty For Weak Password Use- IT Security Guru

New research by Outpost24 has revealed that IT administrators could be just as predictable as end-users when it comes to…

Teenage Lapsus$ ringleader was responsible for crime spree, UK court rules
17
Oct
2023

Hacktivist attacks against Israeli websites mirror attacks following Russian invasion of Ukraine

Hacktivists have launched hundreds web defacement attacks against targets in Israel following the devastating attack by Hamas on Israeli civilians…

Survey Finds Networking and Security Teams Are Converging
17
Oct
2023

Survey Finds Networking and Security Teams Are Converging

Today, Cato Networks announced the findings of its 2023 SASE Adoption Survey. The survey of 1,694 IT leaders worldwide finds that management…

17
Oct
2023

BackBox Network Vulnerability Manager identifies vulnerabilities and classifies them by threat level

BackBox launched Network Vulnerability Manager (NVM). With this new capability added to its existing Network Automation Platform, BackBox integrates automated…

CasaOS Open Source Cloud Software
17
Oct
2023

Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software

Oct 17, 2023NewsroomVulnerability / Cyber Threat Two critical security flaws discovered in the open-source CasaOS personal cloud software could be…

Countrywide Healthcare manages Meraki with Highlight
17
Oct
2023

Countrywide Healthcare manages Meraki with Highlight

Medical and janitorial equipment supplier Countrywide Healthcare has deployed a service assurance management platform from Highlight to manage the Cisco…

Quantum computing and the cryptopocalypse
17
Oct
2023

Beyond Quantum: MemComputing ASICs Could Shatter 2048-bit RSA Encryption

San Diego-based MemComputing is researching the use of in-memory processing ASICs (Application Specific Integrated Circuits) to potentially crack 2048 bit…

Specops cyberattack header
17
Oct
2023

Fighting off cyberattacks? Make sure user credentials aren’t compromised

As an IT professional, you know that threat actors work overtime to get your end-users’ credentials. Whether it’s 3 PM…