Interview: Florence Mottay, global CISO, Zalando
Florence Mottay started her career in cyber security, researching exploits for security vulnerabilities in a small US startup. Today, she is the group chief information…
Florence Mottay started her career in cyber security, researching exploits for security vulnerabilities in a small US startup. Today, she is the group chief information…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Surveillance camera maker Axis Communications said Tuesday…
A serious privilege escalation vulnerability in K7 Ultimate Security, an antivirus product from K7 Computing, was found by abusing named pipes with overly permissive access…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about a critical remote code execution vulnerability affecting Industrial Video & Control’s Longwatch…
The working world is facing a severe resourcing crisis, with many industries finding their usual recruitment wells are running dry. This is particularly the case…
Choosing a security platform is more than just a feature-for-feature comparison. As organisations grow, the underlying architecture of their security tools becomes critically important. A…
The UK’s national security strategy falls short in sufficiently accounting for the digital world’s impact on our daily lives, according to the UK’s independent terrorism…
Security researchers have conducted an in-depth analysis of DragonForce ransomware that initially emerged in 2023 and has since evolved into what it calls a “ransomware…
A significant supply chain security breach has emerged with the discovery of Shai-Hulud 2.0, a sophisticated malware that has compromised over 30,000 GitHub repositories since…
A malicious Rust crate masquerading as an Ethereum Virtual Machine (EVM) utility has been caught delivering silent, OS-specific payloads to developers’ machines. The package, named…
A new wave of attacks is exploiting legitimate Remote Monitoring and Management (RMM) tools like LogMeIn Resolve (formerly GoToResolve) and PDQ Connect to remotely control…
The API supply chain is the new security blind spot. Attackers no longer need to breach your APIs directly; they can target the third-party services…