News

danger lurking in mobile binary code
CIO | Middle East  >  UAE / United Arab Emirates  >  Flag

A magnifying lens exposes an exploit amid binary code.

Critical flaw in Atlassian Confluence actively exploited

The remote code execution vulnerability was recently patched for affected versions of Atlassian Confluence Server and Data Center; users are advised to apply the patch or upgrade.

a hooded figure targets a coding vulnerability

Cosmos DB users advised to regenerate their keys following serious vulnerability

The Azure vulnerability, which affects only those using the Jupyter Notebook feature, gives attackers access to data in databases.

radar grid / computer circuits / intrusion detection / scanning

LockFile ransomware uses intermittent encryption to evade detection

This newly discovered ransomware works fast, has multiple ways to avoid detection, and preys on Windows systems with known vulnerabilities.

A laptop displays binary code and the flag of China.

China's PIPL privacy law imposes new data handling requirements

The Personal Information Protection Law will force global companies doing business in China to be more careful with cross-border flow of personal information.

blind spot side view mirror car vehicle

Security blind spots persist as companies cross-breed security with devops

As devops matures into devsecops, cultural obstacles continue to exert drag.

ransomware breach hackers dark web

OnePercent ransomware group hits companies via IceID banking Trojan

This new, aggressive ransomware group also uses Cobalt Strike to move laterally across the network.

Ransomware  >  A masked criminal ransoms data for payment.

4 most dangerous emerging ransomware threat groups to watch

New research identifies four emerging ransomware groups currently affecting organizations and that show signs of becoming bigger threats in the future.

executive with city montage enterprise businessman executive

New CSO appointments in India

An updated list of newly-appointed chief information security officers at organizations across India.

network security concept

Amazon Sidewalk highlights network security visibility risks consumer services pose

Research warns consumer-grade services can undermine risk assessment of corporate networks amid remote working as Houdini malware spoofs devices to exfiltrate data.

iot internet of things chains security by mf3d getty

IoT devices have serious security deficiencies due to bad random number generation

It's not the IoT vendors' fault. Lack of a cryptographically secure pseudo-random number generator subsystem for the internet of things devices will be vulnerable.

Security system alert, warning of a cyberattack.

Wave of native IIS malware hits Windows servers

IIS malware presents diverse, persistent, and growing threats from old and new threat actors.

A binary eye sits within the center of a targeted virtual framework.

Apple plan to scan users’ iCloud photos raises new fears of government-mandated data access

Experts argue that Apple is clearing a path for governments to gain access to their citizens' data--essentially an encryption backdoor.

keeping the cloud secure cloud security lock padlock private cloud

NSA, CISA release Kubernetes hardening guidance following Colonial Pipeline, other attacks

The guidance seeks to educate IT administrators about cloud security risks and best practices for implementing and maintaining Kubernetes.

industrial power plant hacked skull and crossbone pixels security breach power plant by jason black

Serious flaws in widespread embedded TCP/IP stack endanger industrial control devices

Critical vulnerabilities potentially affect millions of devices, but finding and patching them will be difficult.

stethoscope mobile healthcare ipad tablet doctor patient

Basic flaws put pneumatic tube transport systems in hospitals at risk

Multiple vulnerabilities could allow persistent take-over and ransom demands by attackers.

Praying mantis among green leaves [camouflage/stealth]

APT group hits IIS web servers with deserialization flaws and memory-resident malware

Praying Mantis group is likely a nation-state actor that uses custom malware and is adept at avoiding detection.

man in bed nightmare what keeps you up at night stress sleeping by gorodenkoff getty images

Why code reuse is still a security nightmare

Despite best efforts to track software dependencies, blind spots still exist leading to silent vulnerabilities in software.

Binary flag of the European Union viewed through a magnifying lens and showing a ripple effect.

EU takes aim at ransomware with plans to make Bitcoin traceable, prohibit anonymity

The European Commission has set out new legislative proposals to make crypto transfers more traceable. While the plans will close some existing loopholes, the impact on cybercrime is likely to be minimal, experts say.

Load More