WEBINAR: Vulnerability Risk Management – The Lynchpin of Proactive Security
Join our friends at Forrester and Brinqa on Dec 5 for a live webinar to learn how vulnerability risk management is the foundation for proactive…
Join our friends at Forrester and Brinqa on Dec 5 for a live webinar to learn how vulnerability risk management is the foundation for proactive…
The federal government is set to put an extra $145.5 million into expanding the Digital ID system and scheme over the next four years, adding…
Image: Famartin (CC BY-SA 4.0) Capital Health hospitals and physician offices across New Jersey are experiencing IT outages after a cyberattack hit the non-profit organization’s…
Currently, the FjordPhantom malware appears to be active in Southeast Asia, covering countries including Malaysia, Thailand, Indonesia, Singapore, and Vietnam. Cybersecurity firm Promon has identified…
Critical Zoom Room bug allowed to gain access to Zoom Tenants Pierluigi Paganini November 30, 2023 A critical vulnerability in Zoom Room allowed threat actors…
Cactus ransomware has been exploiting critical vulnerabilities in the Qlik Sense data analytics solution to get initial access on corporate networks. Qlik Sense supports multiple data…
Image: Stan Zemanek (CC BY-SA 3.0) American office supply retailer Staples took down some of its systems earlier this week after a cyberattack to contain the…
The conclusion was reached after researchers evaluated over 9,500 of the largest transactional websites in terms of traffic, encompassing sectors such as banking, e-commerce, and…
The idea of datacentres that run only on flash storage has been discussed for at least 10 years. During that time, some pioneering IT teams…
In a resounding triumph for justice, U.S. District Judge Kathryn Kimball Mizelle has sentenced Vitalii Chychasov, a 37-year-old Ukrainian citizen, to an eight-year federal prison…
Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. This tactic aims to deceive…
Zero-trust architecture is becoming popular because it is a more comprehensive cybersecurity framework than previous castle-and-moat models. Increasing internal threat actors and social engineering call…