Honeywell MOVEit Hackers
29
Jun
2023

Honeywell Servers Compromised by MOVEit Hackers

A flaw was discovered in Progress MOVEit Transfer, a popular third-party online transfer application. By exploiting the flaw, attackers compromised…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
29
Jun
2023

Cyware Snags $30M for Threat Intel Infrastructure Tech

Threat intelligence infrastructure startup Cyware on Thursday announced it had secured $30 million in new financing alongside plans to take…

Criminal IP Bug Bounty Program
29
Jun
2023

Criminal IP Unveils Bug Bounty Program to Boost User Safety, Security

Criminal IP, an OSINT-based CTI search engine provided by AI SPERA, has recently announced the introduction of a bug bounty…

AI Tools Flaw
29
Jun
2023

AI Tools Flaw Lead to Bypass & Compromise Sensitive information

AI Tools have become extremely popular in the software industry and are currently in the initial phase of adoption by…

How Secure Communication Can Enhance Your Organization’s Cyber Defence
29
Jun
2023

How Secure Communication Can Enhance Your Organization’s Cyber Defence

By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due…

Honeywell MOVEit Hackers
29
Jun
2023

A new Infostealer Malware Steal BIOS & Hardware Data

Cybersecurity researchers at FortiGuard Labs recently found an unseen infostealer dubbed “ThirdEye” that is mainly crafted to steal several information…

The 2023 State of Ransomware: A Resurgence Is Brewing
29
Jun
2023

The 2023 State of Ransomware: A Resurgence Is Brewing

By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall…

Preventing sophisticated phishing attacks aimed at employees
29
Jun
2023

Stories from the SOC: Fighting back against credential harvesting with ProofPoint

[ This article was originally published here ] Executive summary is a technique that hackers use to gain unauthorized access…

Iran's MuddyWater Evolves with a New Cyber Weapon
29
Jun
2023

Iran’s MuddyWater Evolves with a New Cyber Weapon

Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework…

IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
29
Jun
2023

IT Sustainability Think Tank: Making sense of the changing green IT regulatory landscape

ESG [Environment, Social and Governance] is everyone’s favourite new acronym, working as a catch-them-all for climate action, worker rights, social…

SecurityWeek talks to Ann Dunkin, CIO at the Department of Energy
29
Jun
2023

DOE CIO Talks to SecurityWeek About Cybersecurity, Digital Transformation

Ann Dunkin is CIO at the US Department of Energy (DOE). Among her responsibilities, she heads IT and oversees cybersecurity….

List
29
Jun
2023

MITRE releases new list of top 25 most dangerous software bugs

MITRE shared today this year’s list of the top 25 most dangerous weaknesses plaguing software during the previous two years….