Author: wordpress

MOVEit breach delivers bundle of 3.4 million baby records

Progress Software vulnerability ID’d in enormous burglary at Ontario’s BORN Canada’s Better Outcomes Registry & Network (BORN) fears a MOVEit breach allowed cybercriminals to copy 3.4 million people’s childcare health records dating back more than a decade.… This article has…

ROBOT crypto attack on RSA is back as Marvin arrives

More precise timing tests find many implementations vulnerable An engineer has identified longstanding undetected flaws in a 25-year-old method for encrypting data using RSA public-key cryptography.… This article has been indexed from The Register – Security Read the original article:…

Balancing Promise and Pitfalls: Integrating AI into Cybersecurity

  In the rapidly evolving digital landscape, the emergence of AI-driven cybersecurity offers a groundbreaking defense against modern cyber threats. However, alongside its celebrated capabilities lies a less-discussed aspect: the hidden costs and challenges associated with Artificial Intelligence (AI).  The…

OpenSea Warns API Customers of Third-Party Security Breach

  Following a third-party security breach that left them potentially susceptible to malicious actors, OpenSea issued a security warning to specific users, urging them to rotate their API credentials.  OpenSea informed impacted customers via email that one of its vendors…

Progressive Holdings Cyberattack: Sensitive Data Stolen

Progressive Holdings, a well-known company that specializes in product leasing, has unexpectedly become the victim of a devastating cyberattack that has resulted in the unauthorized collection of private data. The breach has prompted significant worry among its stakeholders and consumers,…

The Com: Youth Hacking Ring Executing High-profile Cybercrimes

A new threat actor community recently came to light. carrying out some malicious cyberattacks. The online community, labelled as ‘the Com,’ apparently consist of young skilled hackers who are carrying out sophisticated campaigns and high-profile breaches.  The hackers, who are…

Coffee Briefing Sept. 26 – Cybercrime on the rise in Canada; CGI selected by Scotiabank to deploy enterprise payments platform; IBM aims to train two million learners in AI by 2026; and more

Coffee Briefings are timely deliveries of the latest ITWC headlines, interviews, and podcasts. Today’s Coffee Briefing is delivered by IT World Canada’s editorial team! Missed last week’s Coffee Briefing? We’ve got you covered. Cybercrime on the rise in Canada, small…

5 free vulnerability scanners you should check out

Vulnerability scanners delve into systems to uncover security gaps. The primary mission? To fortify organizations against breaches and shield sensitive data from exposure. Beyond merely pinpointing weaknesses, vulnerability scanning is a proactive measure to anticipate potential attacker entry points. The…

Email inboxes are vulnerable to sophistication driven cyber attacks

In today’s digital world of communication, a vast amount of information is stored and processed through email communication. This includes sensitive data related to financial transactions, healthcare, professional endeavors, and personal conversations with loved ones. Consider this scenario: a malicious…

Cybersecurity skills employers are desperate to find in 2023

The surge in digital economic growth and our increasing dependence on it make cybersecurity a critical profession. In this Help Net Security video, Aaron Rosenmund, Director of Security Research and Curriculum, Pluralsight, discusses the most sought-after cybersecurity skills in today’s…