CYBER SECURITY
-
EU’s NIS2 Directive for cybersecurity resilience enters full enforcement
Bharat Mistry, technical director for UK and Ireland at Trend Micro, said: “Becoming NIS2-compliant is a significant undertaking that requires…
Read More » -
Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign
Oct 18, 2024Ravie LakshmananThreat Intelligence / Phishing Attack Threat actors are leveraging fake Google Meet web pages as part of…
Read More » -
Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials
Oct 20, 2024Ravie LakshmananVulnerability / Email Security Unknown threat actors have been observed attempting to exploit a now-patched security flaw…
Read More » -
How regulatory standards and cyber insurance inform each other
Business Security Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions…
Read More » -
Cyberangriff auf Johannesstift Diakonie | CSO Online
Aufgrund einer Cyberattacke auf die Johannesstift Diakonie kämpfen mehrere Krankhäuser in Berlin mit technischen Problemen. yod370 – Shutterstock.com Die Johannesstift…
Read More » -
Introducing HackerOne Gateway Internal Network Testing: Superior Security for Internal Networks
Our Solution: Precision Internal Network Testing with Zero Trust Control We are excited to introduce Gateway Internal Network Testing (INT) as the…
Read More » -
U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign
Oct 18, 2024Ravie LakshmananCyber Intelligence / Critical Infrastructure Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned…
Read More » -
Microsoft fails to collect critical security logs, exposing customers to risks
Widespread impact on security monitoring Microsoft acknowledged that the logging failure affected a range of key services. Microsoft Sentinel, a…
Read More » -
Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks
Oct 19, 2024Ravie LakshmananNetwork Security / Data Breach A nascent threat actor known as Crypt Ghouls has been linked to…
Read More » -
Acronym Overdose – Navigating the Complex Data Security Landscape
In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others.…
Read More »