Learnings from 2022 Breaches: Reassessing Access Controls and Data Security Strategies
Gal Helemski, Co-Founder & CTO/CPO of Many lessons can be learned when reflecting on 2022’s slew of data breaches. As we understand more about data…
Gal Helemski, Co-Founder & CTO/CPO of Many lessons can be learned when reflecting on 2022’s slew of data breaches. As we understand more about data…
Prism Infosec has identified two high-risk vulnerabilities within the Aspect Control Engine building management system (BMS) developed by ABB. ABB’s Aspect BMS enables users to…
The government is funding tests of satellite, wireless and fixed line broadband in rural areas in an attempt to grow rural economies. A £7m fund…
By CW Walker, Director, Security Product Strategy at SpyCloud The first three quarters of 2022 saw the total detection of over 62.29 million new types of malware…
By Noah Johnson, Co-Founder & CTO of Dasera In today’s digital age, data is the lifeblood of business growth. With large amounts of data sprawled…
The hacktivist group Anonymous Sudan has claimed to attack the website of the American artificial intelligence company OpenAI. According to their post, the OpenAI cyber…
During the recent Worldwide Developers Conference (WWDC), Apple Inc. unveiled a range of new privacy and security features designed to enhance user protection. One notable…
Zero Trust is an emerging cybersecurity framework that challenges the traditional perimeter-based security model. In the enterprise cyber world, where the threat landscape is constantly…
Researchers have recently discovered a concerning trend in Vietnam where individuals are falling victim to fraudulent apps. These malicious applications are equipped with a new…
In my last post I discussed how developers can be your security secret weapon… but how to help them love doing security work? That’s a…
Jun 07, 2023Ravie LakshmananMalware / Cyber Attack An unknown threat actor has been observed targeting the U.S. aerospace industry with a new PowerShell-based malware called…
Applications developed by public sector organizations tend to have more security flaws than applications created by the private sector, according to Veracode. The findings are…