Addressing the Cybersecurity Vendor Ecosystem Disconnect
How security teams can bridge the gap between short-term profits and long-term business needs.
Addressing the Cybersecurity Vendor Ecosystem Disconnect Read More »
How security teams can bridge the gap between short-term profits and long-term business needs.
Addressing the Cybersecurity Vendor Ecosystem Disconnect Read More »
The company reports that customers based in Chile, Spain, and Uruguay were the primary victims of the breach, alongside some former employees of the global bank.
Santander Falls Victim to Data Breach Involving Third-Party Provider Read More »
Thankfully, GE ultrasounds aren’t Internet-facing. Exploiting most of the bugs to cause serious damage to patients would require physical device access.
GE Ultrasound Gear Riddled With Bugs, Open to Ransomware & Data Theft Read More »
Researchers believe the attacker is likely China-affiliated, since a previous version of the malware was used by a China nation-state attack group.
US AI Experts Targeted in SugarGh0st RAT Campaign Read More »
Generative AI and software supply chain attacks are being exploited to disrupt, manipulate, and steal.
Asian Threat Actors Use New Techniques to Attack Familiar Targets Read More »
In a first-ever move, the commission’s enforcement bureau has high hopes that official classification will allow law enforcement partners to better combat these kinds of threats.
FCC Reveals ‘Royal Tiger’ Robocall Campaign Read More »
When abused by threat actors with sophisticated social-engineering chops, remote-access tools demand that enterprises remain sharp in both defense strategy and employee-awareness training.
Windows Quick Assist Anchors Black Basta Ransomware Gambit Read More »
Since its inception, three key factors have affected the NVD’s ability to classify security concerns — and what we’re experiencing now is the result.
The Fall of the National Vulnerability Database Read More »
The SynthID line of watermarking techniques can be used to identify images, video, and text generated by artificial intelligence.
Google’s AI Watermarks Will Identify Deepfakes Read More »
Google has rolled an emergency patch for CVE-2024-4947, the third Chrome zero-day it’s addressed in the past week.
Patch Now: Another Google Zero-Day Under Exploit in the Wild Read More »
In the midst of an economy struggling with soaring inflation, the Nigerian government paused plans to place a levy on domestic transactions that was aimed at enhancing cybersecurity.
Nigeria Halts Cybersecurity Tax After Public Outrage Read More »
Attackers can exploit the issue to trick users into connecting to insecure networks, but it works only under specific conditions.
Flaw in Wi-Fi Standard Can Enable SSID Confusion Attacks Read More »
Instead of online contraband, the website now asks anyone with information that could help with the investigation to contact authorities.
FBI, DoJ Shut Down BreachForums, Launch Investigation Read More »
Cybercriminals are trafficking DocuSign assets that allow for easy extortion and business email compromise.
Scammers Fake DocuSign Templates to Blackmail & Steal From Companies Read More »
A vulnerability in the HNAP login request protocol that affects a family of devices gives unauthenticated users root access for command execution.
D-Link Routers Vulnerable to Takeover Via Exploit for Zero-Day Read More »
CISOs are now considered part of the organizational executive leadership and have both the responsibility and the opportunity to drive not just security but business success.
3 Tips for Becoming the Champion of Your Organization’s AI Committee Read More »
SANS Institute experts weigh in on the top threat vectors faced by enterprises and the public at large.
Top 5 Most Dangerous Cyber Threats in 2024 Read More »