mobile phone touchscreen in hands

Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem

Spyware vendors use a combination of zero-day exploits and known vulnerabilities. Google TAG researchers urge faster patching of mobile devices

virus chatbot chatcpgt security binary code cybersecurity infosec information data leak

Italian privacy regulator bans ChatGPT over collection, storage of personal data

Italy’s privacy Guarantor bans ChatGPT with immediate effect as it investigates its data privacy procedures.

Conceptual image of a network of executives / silhouettes of executives in motion.

New CISO appointments, February 2023

Keep up with news of CSO, CISO, and other senior security executive appointments.


Kyndryl office wall

Kyndryl lays off staff in search of efficiency

The layoffs are part of a restructuring initiative aimed at improving efficiency and customer service, Kyndryl says.

Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

3CX DesktopApp compromised by supply chain attack

3CX will be releasing an update for the DesktopApp in the next few hours; meanwhile, users are urged to use the PWA Client instead.

major cyber attack global international cybersecurity

APT group Winter Vivern exploits Zimbra webmail flaw to target government entities

Winter Vivern's campaign shows that threat actors can effectively take advantage of medium-severity vulnerabilities.

australian money piles of cash currency colorful denominations by enjoynz gettyimages 477047608

DXC Technology says global network is not compromised following Latitude Financial breach

IT services provider DXC sparked questions after quietly publishing a note that its networks were not compromised following the Latitude Financial breach.

social media network interaction

North Korean threat actor APT43 pivots back to strategic cyberespionage

The APT43 group is highly adept at using social engineering to target individuals and extract sensitive information.

shutterstock 1850095465 internet API application programming interface

Noname Security releases API security updates

The latest API security upgrades from Noname focus on expanded testing and discovery.

blocking spam e mail warning pop up phishing mail network security laptop computer

HP releases Wolf Connect solution for secure remote PC management

HP releases Wolf Connect solution for secure remote PC management


1798109056 decision making ciso soc

Latin American companies, governments need more focus on cybersecurity

A new report shows the growing impact cyberattacks have on Latin American economies. Governments and organizations can do more.

access management / access control / user connections / identities

Spera exits stealth to reveal identity-based threat hunting capabilities

Spera’s ISPM capabilities provides a comprehensive inventory of a customer’s identities, permissions and environments to surface critical anomalies.

passwordless header

Legacy, password-based authentication systems are failing enterprise security, says study

Sixty percent of respondents hit by an authentication-related cyberattack in the last 12 months agreed that they could have avoided it with a passwordless system.


Skyhawk adds ChatGPT functions to enhance cloud threat detection, incident discovery

Cloud threat detection and response vendor has applied ChatGPT features to its platform in two distinct ways — earlier detection of malicious activity and explicability of attacks as they progress.

CIO | Middle East  >  Israel  >  Flag

DarkBit puts data from Israel’s Technion university on sale

DarkBit had previously demanded 80 bitcoins as ransom, and said it would sell the data within five days if the ransom went unpaid.