Quantcast
Browsing all 1623 articles
Browse latest View live

New RAT digs into Android phones to steal data and encrypt files

Outdated Android devices are being targeted by novel, targeted malware “Rafel RAT” to steal data and, sometimes, carry out ransomware attacks, according to a CheckPoint research. As many as 120...

View Article


Car dealerships face continued disruption as CDK works to restore hacked systems

Car dealerships across North America are facing ongoing disruptions as software provider CDK Global grapples with the aftermath of a cyberattack Wednesday. The company began restoring its systems...

View Article


Why identity security Is essential to cybersecurity strategy

In the modern digital landscape, cybersecurity isn’t just a technical challenge – it’s a business imperative. At the heart of cybersecurity is identity security – the principle that the right people...

View Article

Image may be NSFW.
Clik here to view.

Understanding APIs and how attackers abuse them to steal data

Simply put, APIs (short for application programming interface) are how machines, cloud workloads, automation and other non-human entities communicate with one another. They also represent an access...

View Article

Evaluating crisis experience in CISO hiring: What to look for and look out for

When hiring qualified security personnel, established practice tells us to look for a host of positive signals. The ideal colleague, as the conventional wisdom goes, is likely well-rounded and...

View Article


US investigates China Mobile, China Telecom, and China Unicom over data...

The US has launched investigations into China Mobile, China Telecom, and China Unicom amid concerns that these firms could misuse their access to US data, according to a Reuters report. The country’s...

View Article

Image may be NSFW.
Clik here to view.

6 ways the CISO role is evolving today

While organizations have been fixated on transforming their business processes over the past several years, the top IT security exec role has been transforming as well. Today’s CISOs and CSOs are...

View Article

Did hackers steal 33TB of data from the Federal Reserve?

The infamous ransomware gang LockBit has added the Federal Reserve to the list of victims on its leak site, claiming it has in its possession 33 terabytes of sensitive US banking data. In the post on...

View Article


How do we protect and maintain the security of the modern browser?

The modern web browser has undergone a profound transformation in recent years, becoming an indispensable tool in today’s digital age. It facilitates online communication and provides unparalleled...

View Article


Ollama patches critical vulnerability in open-source AI-framework

Security researchers have discovered a critical remote code execution (RCE) flaw in Ollama, an open-source development platform for AI-based projects. Inspired by Docker, Ollama aims to simplify the...

View Article

What prevents SMBs from adopting SSO

A report by the Cybersecurity and Infrastructure Security Agency (CISA) is the latest research to point out the Barriers to Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses. While...

View Article

Organizations with outdated security approaches getting hammered: Cloudflare

Security teams are having great difficulty keeping pace with the risks posed by organizations’ dependency on modern applications — the technology that “underpins all of today’s most used sites,”...

View Article

What is digital executive protection and how does it work?

Zealots, nation-states, terrorists, and disgruntled individuals are increasingly targeting corporate executives, government leaders, and other public figures and their families through their online...

View Article


Continuous red-teaming is your only AI risk defense

AI models present CISOs with evolutionary threats that that we may never fully understand. Their very dynamic nature — continually ingesting new data to develop new capabilities — suggests that the...

View Article

Cloud security faces pressure from AI growth, multicloud use

There is a growing sense of urgency surrounding cloud security as IT professionals deal with complex new threats and increasing cyberattacks targeted towards cloud resources, Thales Inc’s 2024 Cloud...

View Article


Orca bolsters cloud security offering with source code support

Cybersecurity provider Orca has added new source code posture management capabilities to its cloud security offering by adding support for popular source code management (SCM) platforms. The new...

View Article

Microsoft-owned vendor blamed for massive healthcare breach

US-based Geisinger is warning patients of a security breach at one of its vendors that has likely compromised the data of more than a million of the healthcare giant’s patients. In a November...

View Article


Formerly legitimate Polyfill.io domain abused to serve malicious code

A site formerly used to host a service geared towards adding JavaScript polyfills to web pages to ensure compatibility with older browsers is being abused to serve malicious scripts as part of a...

View Article

Unlocking the potential of Generative AI starts with a secure foundation

Generative AI’s impact cannot be understated, as more than 55% of organizations are already piloting or actively using the technology. For all its potential benefits, generative AI raises valid...

View Article

Building the foundation for secure Generative AI

Generative Artificial Intelligence is a transformative technology that has captured the interest of companies worldwide and is quickly being integrated into enterprise IT roadmaps. Despite the promise...

View Article
Browsing all 1623 articles
Browse latest View live