Category: EN

Securing Digital Identities – Best Practices for CISOs

In the digital age, the security of digital identities has become a defining challenge for organizations worldwide. As businesses embrace cloud computing, remote work, and interconnected ecosystems, digital identities representing users, devices, and applications have become prime targets for cybercriminals.…

What’s happening with MITRE and the CVE program uncertainty

Yesterday’s headlines have sent ripples through the cybersecurity and software supply chain communities: MITRE announced that U.S. government funding for the CVE (Common Vulnerabilities and Exposures) database was set to expire today. Overnight, the CVE Foundation emerged with a plan…

Researchers Expose Medusa Ransomware Group’s Onion Site

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware groups, Medusa Locker. Known for targeting critical sectors like healthcare, education, and manufacturing, the group has been responsible for numerous cyberattacks since its detection in 2019.…

Vulnerability Summary for the Week of April 7, 2025

High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info n/a — n/a   A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating…

ASML, Others Outline Impact Of Trump’s Tariffs

Chip making giant ASML mirrors other equipment makers, and outlines financial impact of Donald Trump’s tariffs This article has been indexed from Silicon UK Read the original article: ASML, Others Outline Impact Of Trump’s Tariffs

Hackers Target Investors Through Fraud Networks to Steal Financial Data

Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data. Utilizing digital platforms, encrypted messaging apps, and crypto transactions, these criminals exploit the rise of online investment platforms to conduct their fraudulent activities. Fraudulent networks employ…