Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk
Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk
Progress Software urges users to update Telerik Report Server due to a critical security flaw (CVE-2024-6327) with a CVSS score of 9.9.
ift.tt
One year after SEC cyber disclosure ruling, security leaders weigh in
One year after SEC cyber disclosure ruling, security leaders weigh in
With a year in the rearview mirror, security professionals are reflecting on the SEC cyber disclosure ruling.
ift.tt
Feds Warn of North Korean Cyberattacks on US Critical Infrastructure
Feds Warn of North Korean Cyberattacks on US Critical Infrastructure
The Andariel group is targeting critical defense, aerospace, nuclear, and engineering companies for data theft, the FBI, NSA, and others said.
ift.tt
CrowdStrike ‘Updates’ Deliver Malware & More as Attacks Snowball
CrowdStrike 'Updates' Deliver Malware & More as Attacks Snowball
Phishing and fraud surges during any national news story. This time though, the activity is both more voluminous and more targeted.
ift.tt
Microsoft’s Internet Explorer Gets Revived to Lure in Windows Victims
Microsoft's Internet Explorer Gets Revived to Lure in Windows Victims
Though IE was officially retired in June 2022, the vulnerability ramped up in January 2023 and has been going strong since.
ift.tt
Unexpected Lessons Learned From the CrowdStrike Event
Unexpected Lessons Learned From the CrowdStrike Event
How your organization can leverage the disruptive CrowdStrike update to become more resilient.
ift.tt
How organizations can save CISOs amidst increasing federal regulations
How organizations can save CISOs amidst increasing federal regulations
How can an organization save its CISO? It starts with four key strategies.
ift.tt
Security Firm Accidentally Hires North Korean Hacker, Did Not KnowBe4
Security Firm Accidentally Hires North Korean Hacker, Did Not KnowBe4
A software engineer hired for an internal IT AI team immediately became an insider threat by loading malware onto his workstation.
ift.tt
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
North Korean hackers expand from espionage to ransomware attacks, targeting critical infrastructure and infiltrating US companies with stolen identiti
ift.tt
Is Our Water Safe to Drink? Securing Our Critical Infrastructure
Is Our Water Safe to Drink? Securing Our Critical Infrastructure
Our critical systems can be protected from looming threats by embracing a proactive approach, investing in education, …
ift.tt
Google Will Not Remove Third-Party Cookies From Chrome
Google Will Not Remove Third-Party Cookies From Chrome
Cookies aren't going away, after all. After years of saying it will do so, Google has decided to not remove third-party cookies from Chrome.
ift.tt
Creating a safer workplace: California Senate Bill 553 becomes law
Creating a safer workplace: California Senate Bill 553 becomes law
From a security professional’s perspective, SB 553 will ultimately help security practitioners lobby for larger budgets.
ift.tt
6 Types of Applications Security Testing You Must Know About
6 Types of Applications Security Testing You Must Know About
Explore six essential application security testing methods to keep your software secure and compliant.
ift.tt
Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams
Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams
Meta removes 63,000 Instagram accounts in Nigeria for financial sextortion, exposing a cybercrime network targeting adults and minors.
ift.tt
Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security
Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security
Discover the importance of browser security in modern enterprises and learn new strategies to protect your organization.
ift.tt
Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform
Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform
Tenable discloses a vulnerability in Google Cloud Functions, allowing unauthorized access to sensitive data and services
ift.tt
CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software
CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software
ISC releases patches for BIND 9 DNS software to fix vulnerabilities preventing denial-of-service attacks
ift.tt
Zest Security Aims to Resolve Cloud Risks
Zest Security Aims to Resolve Cloud Risks
Cybersecurity startup Zest Security emerged from stealth with an AI-powered cloud risk resolution platform to reduce t…
ift.tt
Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins
Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins
Docker warns of critical flaw in Engine versions, allowing attackers to bypass authorization. Patch available. Users urged to update immediately
ift.tt
New Chrome Feature Scans Password-Protected Files for Malicious Content
New Chrome Feature Scans Password-Protected Files for Malicious Content
Google Chrome introduces detailed security warnings and automatic deep scans for Enhanced Protection users to enhance download safety.
ift.tt
Pro-Palestinian Actor Levels 6-Day DDoS Attack on UAE Bank
Pro-Palestinian Actor Levels 6-Day DDoS Attack on UAE Bank
DDoS attack campaign averaged 4.5 million requests per second, putting the bank under attack 70% of the time.
ift.tt
12.9 million individuals affected by MediSecure cyber breach
12.9 million individuals affected by MediSecure cyber breach
Sensitive data, including personal and health information, was exposed in a cyber incident against MediSecure.
ift.tt
Small Businesses Need Default Security in Products Now
Small Businesses Need Default Security in Products Now
Small firms are increasing targeted by ransomware gangs and seen as a gateway into larger companies' networks, so …
ift.tt
Fighting Third-Party Risk With Threat Intelligence
Fighting Third-Party Risk With Threat Intelligence
With every new third-party provider and partner, an organization's attack surface grows. How, then, do enterprises use…
ift.tt