Germany blames Russian hackers for months-long cyber espionage
Russia was involved in a months-long cyber espionage campaign against Germany last year, which involved targeting politicians and the defense sector, German officials said, adding they have evidence...
View ArticleDownload the Zero Trust network access (ZTNA) enterprise buyer’s guide
The Zero Trust network access (ZTNA) approach replaces the perimeter defense model with a “least privilege” framework where users authenticate to access specific data and applications. Access Control,...
View ArticleSearch + RAG: The 1-2 punch transforming the modern SOC with AI-driven...
The cybersecurity industry is facing a workforce gap. In fact, the gap between the number of skilled cybersecurity workers needed vs the amount available has grown 12.6% year over year worldwide. This...
View ArticleGoogle launches Google Threat Intelligence at RSA Conference
Google unveiled Google Threat Intelligence, a new Google Cloud Security offering, at the RSA Conference on Monday. The service aims to provide organizations with enhanced visibility into the global...
View ArticleWhat is IAM? Identity and access management explained
Identity and access management definition IAM is a set of security services, processes, policies, and tools to define and manage the roles and access of users, devices, and application programming...
View ArticleCitrix quietly fixes a new critical vulnerability similar to Citrix Bleed
A critical vulnerability has been affecting a line of Citrix NetScaler appliances, allowing attackers to capture sensitive information from the devices’ memory, but is now fixed, according to a Bishop...
View ArticleChange Healthcare went without cyber insurance before debilitating ransomware...
Congressional hearings have revealed that UnitedHealth was without cyber-insurance coverage before a hugely debilitating ransomware attack on its Change Healthcare subsidiary. During questions before...
View ArticleUS deploys commerce and communications against cyber threats, Blinken says
The US government is doing everything it can to manage the cybersecurity challenges of quantum computing, cloud strategies, and generative AI and trying to secure sensitive technology hardware,...
View ArticleAdministrator of ransomware operation LockBit named, charged, has assets frozen
The suspected creator and administrator of the notorious LockBit ransomware-as-a-service operation was indicted Tuesday in the United States on more than two dozen criminal charges. In addition, the...
View ArticleHunters announces full adoption of OCSF and introduces OCSF-native search
RSA Conference, San Francisco, May 7, 2024 – Hunters, the pioneer in modern SOC platforms, today announced its full adoption of the Open Cybersecurity Schema Framework (OCSF), coupled with the launch...
View ArticleHow to future-proof Windows networks: Take action now on planned phaseouts...
In January 2002, Bill Gates sent an infamous email to all of his employees indicating that Microsoft had decided to put security henceforth first and foremost after several headline events pushed the...
View ArticleKinsing crypto mining campaign targets 75 cloud-native applications
An attack campaign dubbed Kinsing that targets cloud-native environments to deploy cryptocurrency mining malware is still going strong after five years, according to a research report by cloud...
View ArticleGoogle, Meta, Spotify accused of flouting Apple’s device fingerprinting rules
Apple’s crusade for user privacy on its iOS platform stares at a potential setback as a new report accused tech bigwigs including Google, Meta, and Spotify of flouting the company’s guidelines on...
View ArticleDocGo says hackers stole patient data in a recent cyberattack
Mobile medical services provider DocGo has suffered a breach in its US-based ambulance transportation business, the company said in an SEC filing. The healthcare provider, offering mobile health...
View ArticleMassive security hole in VPNs shows their shortcomings as a defensive measure
A massive security hole in virtual private networks (VPNs) reported this week highlights the fact that they were never intended to fulfill a security function despite widespread use as a defensive...
View ArticleSuspected Chinese hack of Britain’s Ministry of Defence linked to contractor,...
A suspected Chinese hack that exposed payroll records of 270,000 members of the British armed services was connected to the “potential failings” of a government contractor, UK defence secretary Grant...
View ArticleF5 patches BIG-IP Next Central Manager flaws that could lead to device takeover
Multicloud security and application delivery vendor F5 has fixed two high-risk vulnerabilities in BIG-IP Next Central Manager, the central component used to manage BIG-IP Next load balancers and app...
View ArticlePalo Alto launches AI-powered solutions to fight AI-generated cyberthreats
Palo Alto Networks has launched a new suite of security solutions designed to help enterprises combat AI-generated cyberthreats. The suite is powered by its proprietary solution, Precision AI, which...
View ArticleZscaler shuts down exposed system after rumors of a cyberattack
In response to the rumors of a threat actor hacking and selling access to its systems, Zscaler said it has taken a “test environment” offline for analysis which was found to be exposed. “Our...
View Article