Advertisement
- Don't Miss:
- CSO50 2022 Award Winners
- CSO Hall of Fame honorees
Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem
Spyware vendors use a combination of zero-day exploits and known vulnerabilities. Google TAG researchers urge faster patching of mobile devices
Italian privacy regulator bans ChatGPT over collection, storage of personal data
Italy’s privacy Guarantor bans ChatGPT with immediate effect as it investigates its data privacy procedures.
New CISO appointments, February 2023
Keep up with news of CSO, CISO, and other senior security executive appointments.
Advertisement
Kyndryl lays off staff in search of efficiency
The layoffs are part of a restructuring initiative aimed at improving efficiency and customer service, Kyndryl says.
3CX DesktopApp compromised by supply chain attack
3CX will be releasing an update for the DesktopApp in the next few hours; meanwhile, users are urged to use the PWA Client instead.
APT group Winter Vivern exploits Zimbra webmail flaw to target government entities
Winter Vivern's campaign shows that threat actors can effectively take advantage of medium-severity vulnerabilities.
DXC Technology says global network is not compromised following Latitude Financial breach
IT services provider DXC sparked questions after quietly publishing a note that its networks were not compromised following the Latitude Financial breach.
North Korean threat actor APT43 pivots back to strategic cyberespionage
The APT43 group is highly adept at using social engineering to target individuals and extract sensitive information.
Noname Security releases API security updates
The latest API security upgrades from Noname focus on expanded testing and discovery.
HP releases Wolf Connect solution for secure remote PC management
HP releases Wolf Connect solution for secure remote PC management
Advertisement
Latin American companies, governments need more focus on cybersecurity
A new report shows the growing impact cyberattacks have on Latin American economies. Governments and organizations can do more.
Spera exits stealth to reveal identity-based threat hunting capabilities
Spera’s ISPM capabilities provides a comprehensive inventory of a customer’s identities, permissions and environments to surface critical anomalies.
Legacy, password-based authentication systems are failing enterprise security, says study
Sixty percent of respondents hit by an authentication-related cyberattack in the last 12 months agreed that they could have avoided it with a passwordless system.
Skyhawk adds ChatGPT functions to enhance cloud threat detection, incident discovery
Cloud threat detection and response vendor has applied ChatGPT features to its platform in two distinct ways — earlier detection of malicious activity and explicability of attacks as they progress.
DarkBit puts data from Israel’s Technion university on sale
DarkBit had previously demanded 80 bitcoins as ransom, and said it would sell the data within five days if the ransom went unpaid.
From Our Advertisers
-
Featured Sponsor IntelCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by EntrustR.I.P. passwords. Hello peace of mind
-
Sponsored by Microsoft SecurityThe convergence of IT and OT and its impact on growing infrastructure risks
-
Sponsored by FortinetPublic-Private Partnerships are Essential to Strengthen Cybersecurity Globally