In this interview for Help Net Security, Katie Taitler, Senior Cybersecurity Strategista at Axonius, talks about cyber threats in the energy sector and what should be improved to make...
https://player.vimeo.com/video/741880176?h=644d1377c9&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Given inflation and economic uncertainty, the cybersecurity industry is starting to experience budget cuts, despite a surge in ransomware attacks. As more budgets are going under...
Are inadequate security policies for privileged access making you highly vulnerable to security breaches and ransomware attacks? In the weeks that followed the high-profile attack on...
KELA surveyed 400 security team members in the US who were responsible for gathering cybercrime threat intelligence daily to better understand if they’re proactively scanning the dark web...
Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, Claroty, Concentric AI, Cymulate, Deepfence, Drata, Fortinet, Halo Security, NetRise,...
Chrome version 104 accidentally introduced a bug that removes the user requirement to approve clipboard writing events from websites they visit. This functionality isn’t limited to...
The Ragnar Locker ransomware gang has claimed an attack on the flag carrier of Portugal, TAP Air Portugal, disclosed by the airline after its systems were...
Microsoft found and reported a high severity flaw in the TikTok Android app in February that allowed attackers to “quickly and quietly” take over accounts with...
Google wants to improve the security of its open source projects and those projects’ third-party dependencies by offering rewards for bugs found in them. “Depending on the severity of...
Protecting an organization’s digital infrastructure is certainly no easy task. From cloud assets to online devices, customers and websites, to servers, the list goes on and...
Recent Comments