Advertisement
Latest News
Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem
Spyware vendors use a combination of zero-day exploits and known vulnerabilities. Google TAG researchers urge faster patching of mobile devices
Italian privacy regulator bans ChatGPT over collection, storage of personal data
Italy’s privacy Guarantor bans ChatGPT with immediate effect as it investigates its data privacy procedures.
Kyndryl lays off staff in search of efficiency
The layoffs are part of a restructuring initiative aimed at improving efficiency and customer service, Kyndryl says.
Advertisement
3CX DesktopApp compromised by supply chain attack
3CX will be releasing an update for the DesktopApp in the next few hours; meanwhile, users are urged to use the PWA Client instead.
APT group Winter Vivern exploits Zimbra webmail flaw to target government entities
Winter Vivern's campaign shows that threat actors can effectively take advantage of medium-severity vulnerabilities.
DXC Technology says global network is not compromised following Latitude Financial breach
IT services provider DXC sparked questions after quietly publishing a note that its networks were not compromised following the Latitude Financial breach.
North Korean threat actor APT43 pivots back to strategic cyberespionage
The APT43 group is highly adept at using social engineering to target individuals and extract sensitive information.
Noname Security releases API security updates
The latest API security upgrades from Noname focus on expanded testing and discovery.
HP releases Wolf Connect solution for secure remote PC management
HP releases Wolf Connect solution for secure remote PC management
Latin American companies, governments need more focus on cybersecurity
A new report shows the growing impact cyberattacks have on Latin American economies. Governments and organizations can do more.
Advertisement
Spera exits stealth to reveal identity-based threat hunting capabilities
Spera’s ISPM capabilities provides a comprehensive inventory of a customer’s identities, permissions and environments to surface critical anomalies.
Legacy, password-based authentication systems are failing enterprise security, says study
Sixty percent of respondents hit by an authentication-related cyberattack in the last 12 months agreed that they could have avoided it with a passwordless system.
Skyhawk adds ChatGPT functions to enhance cloud threat detection, incident discovery
Cloud threat detection and response vendor has applied ChatGPT features to its platform in two distinct ways — earlier detection of malicious activity and explicability of attacks as they progress.
DarkBit puts data from Israel’s Technion university on sale
DarkBit had previously demanded 80 bitcoins as ransom, and said it would sell the data within five days if the ransom went unpaid.
5 cyber threats retailers are facing — and how they’re fighting back
Ransomware, point-of-sale hacks, and supply chain threats are just a few of the worries for today’s retailers. The stakes are high when you’re handling big money and reams of consumer data.
From Our Advertisers
-
Featured Sponsor IntelCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by CiscoStop the Sprawl: How Vendor Consolidation Can Reduce Security Risks in the
-
Sponsored by 1Password1Password integrates with Okta SSO
-
Sponsored by Palo Alto NetworksCybersecurity Automation: Leveling the Playing Field