New RAT digs into Android phones to steal data and encrypt files
Outdated Android devices are being targeted by novel, targeted malware “Rafel RAT” to steal data and, sometimes, carry out ransomware attacks, according to a CheckPoint research. As many as 120...
View ArticleCar dealerships face continued disruption as CDK works to restore hacked systems
Car dealerships across North America are facing ongoing disruptions as software provider CDK Global grapples with the aftermath of a cyberattack Wednesday. The company began restoring its systems...
View ArticleWhy identity security Is essential to cybersecurity strategy
In the modern digital landscape, cybersecurity isn’t just a technical challenge – it’s a business imperative. At the heart of cybersecurity is identity security – the principle that the right people...
View ArticleUnderstanding APIs and how attackers abuse them to steal data
Simply put, APIs (short for application programming interface) are how machines, cloud workloads, automation and other non-human entities communicate with one another. They also represent an access...
View ArticleEvaluating crisis experience in CISO hiring: What to look for and look out for
When hiring qualified security personnel, established practice tells us to look for a host of positive signals. The ideal colleague, as the conventional wisdom goes, is likely well-rounded and...
View ArticleUS investigates China Mobile, China Telecom, and China Unicom over data...
The US has launched investigations into China Mobile, China Telecom, and China Unicom amid concerns that these firms could misuse their access to US data, according to a Reuters report. The country’s...
View Article6 ways the CISO role is evolving today
While organizations have been fixated on transforming their business processes over the past several years, the top IT security exec role has been transforming as well. Today’s CISOs and CSOs are...
View ArticleDid hackers steal 33TB of data from the Federal Reserve?
The infamous ransomware gang LockBit has added the Federal Reserve to the list of victims on its leak site, claiming it has in its possession 33 terabytes of sensitive US banking data. In the post on...
View ArticleHow do we protect and maintain the security of the modern browser?
The modern web browser has undergone a profound transformation in recent years, becoming an indispensable tool in today’s digital age. It facilitates online communication and provides unparalleled...
View ArticleOllama patches critical vulnerability in open-source AI-framework
Security researchers have discovered a critical remote code execution (RCE) flaw in Ollama, an open-source development platform for AI-based projects. Inspired by Docker, Ollama aims to simplify the...
View ArticleWhat prevents SMBs from adopting SSO
A report by the Cybersecurity and Infrastructure Security Agency (CISA) is the latest research to point out the Barriers to Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses. While...
View ArticleOrganizations with outdated security approaches getting hammered: Cloudflare
Security teams are having great difficulty keeping pace with the risks posed by organizations’ dependency on modern applications — the technology that “underpins all of today’s most used sites,”...
View ArticleWhat is digital executive protection and how does it work?
Zealots, nation-states, terrorists, and disgruntled individuals are increasingly targeting corporate executives, government leaders, and other public figures and their families through their online...
View ArticleContinuous red-teaming is your only AI risk defense
AI models present CISOs with evolutionary threats that that we may never fully understand. Their very dynamic nature — continually ingesting new data to develop new capabilities — suggests that the...
View ArticleCloud security faces pressure from AI growth, multicloud use
There is a growing sense of urgency surrounding cloud security as IT professionals deal with complex new threats and increasing cyberattacks targeted towards cloud resources, Thales Inc’s 2024 Cloud...
View ArticleOrca bolsters cloud security offering with source code support
Cybersecurity provider Orca has added new source code posture management capabilities to its cloud security offering by adding support for popular source code management (SCM) platforms. The new...
View ArticleMicrosoft-owned vendor blamed for massive healthcare breach
US-based Geisinger is warning patients of a security breach at one of its vendors that has likely compromised the data of more than a million of the healthcare giant’s patients. In a November...
View ArticleFormerly legitimate Polyfill.io domain abused to serve malicious code
A site formerly used to host a service geared towards adding JavaScript polyfills to web pages to ensure compatibility with older browsers is being abused to serve malicious scripts as part of a...
View ArticleUnlocking the potential of Generative AI starts with a secure foundation
Generative AI’s impact cannot be understated, as more than 55% of organizations are already piloting or actively using the technology. For all its potential benefits, generative AI raises valid...
View ArticleBuilding the foundation for secure Generative AI
Generative Artificial Intelligence is a transformative technology that has captured the interest of companies worldwide and is quickly being integrated into enterprise IT roadmaps. Despite the promise...
View Article