Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws
Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway ‘s parliament, the Storting, was hit by a new cyberattack,…
Apple fixes CVE-2021-1844 RCE that affects iOS, macOS, watchOS, and Safari
Apple released out-of-band patches to address a remote code execution, tracked as CVE-2021-1844, that affect iOS, macOS, watchOS, and Safari web browser. Apple has released out-of-band security patches to address…
Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN
By Krupa Srivatsan, Director, Cybersecurity Product Marketing at Infoblox With the remote working trend on the rise due to the COVID-19 pandemic, many IT managers and corporate leaders have naturally…
Detecting Privilege Escalation
By Garret Grajek, CEO, YouAttest During the first half of 2020 alone, over 36 billion records were exposed through various data breaches, with the FBI reporting an increase of 300%…
Airplane manufacturer Bombardier has disclosed a security breach, data leaked online
Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal…
The US Government is going to respond to the SolarWinds hack very soon
The US is going to respond to the SolarWinds supply chain attack within weeks, national security adviser Jake Sullivan told CNN. The US will respond within weeks to the devastating SolarWinds…
Vulnerability Patching: Why Does It Fall Short So Often?
Weak threat insight, SecOps competing priorities, and fear of making things worse are key reasons By Chris Goettl, Director of Security Product Management, Ivanti It isn’t glamorous. It won’t guarantee…
Personal Data Breaches for GDPR Compliance: Everything You Need to Know
By Dan May, Commercial Director, ramsac In the new era of cybercrime, identifying the proper sanctions and reactions for any business can seem challenging, if not confusing. When it comes…
A Third Of Americans Trust Facebook With Personal Data More Than Government, Study Shows
The level of trust in Facebook versus the government also varies between demographic groups. By Kathryn Robinson, Privacy Expert, Privacy Tiger In today’s ever-changing data-driven society, it’s a challenge for…
SonicWall released patch for actively exploited SMA 100 zero-day
SonicWall has released a security patch to address the zero-day flaw actively exploited in attacks against the SMA 100 series appliances. SonicWall this week released firmware updates (version 10.2.0.5-29sv) to…
Asset Management, The Weakest Link in Cybersecurity Risk
By Gyan Prakash, Head of Cyber Security / Security Engineering, Altimetrik Corp Summary This paper shares the details on the limitations of existing asset management solutions for Cybersecurity needs and…
Businesses Must Protect Their Most Critical Asset: Their Data
By Trevor J. Morgan, Ph.D., Product Manager at comforte AG Protecting sensitive data is a challenge facing every business and enterprise. The value of data is rising to the extent…