Category: EN

UK Government Introduces New Data Governance Legislation

The Data (Use and Access) Bill governs digital verification services and the use of personal data in public services, and will revamp the Information Commissioner’s Office This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Government Introduces…

Perplexity Boss Surprised After New Corp Sues

News Corp surprises Perplexity, after the media group sued the AI search engine for allegedly infringing copyright content This article has been indexed from Silicon UK Read the original article: Perplexity Boss Surprised After New Corp Sues

Cybersecurity Teams Largely Ignored in AI Policy Development

A new ISACA study has revealed that cybersecurity professionals are often overlooked in the development of AI policies This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybersecurity Teams Largely Ignored in AI Policy Development

NotLockBit Ransomware Targets Both Windows and MacOS

Researchers warn that NotLockBit, a new malware family mimicking LockBit ransomware, can impact Windows and macOS systems. The malware appears to be the first fully functional ransomware targeting macOS systems, moving beyond previous proof-of-concept (PoC) samples. What is NotLockBit Ransomware…

Majority of SaaS Applications, AI Tools Unmanaged

Unmanaged software as a service (SaaS) applications and AI tools within organizations are posing a growing security risk as vulnerabilities increase, according to a report from Grip Security. The post Majority of SaaS Applications, AI Tools Unmanaged appeared first on…

Fortinet FortiManager flaw exploited in zero-day attacks (CVE-2024-47575)

Fortinet has finally made public information about CVE-2024-47575, a critical FortiManager vulnerability that attackers have exploited as a zero-day. About CVE-2024-47575 CVE-2024-47575 is a vulnerability stemming from missing authentication for a critical function in FortiManager’s fgfmd daemon. Remote, unauthenticated attackers…

Xerox Printers Vulnerable to Remote Code Execution Attacks

Multiple Xerox printer models, including EC80xx, AltaLink, VersaLink, and WorkCentre, have been identified as vulnerable to an authenticated remote code execution (RCE) attack. This vulnerability tracked as CVE-2024-6333, poses a significant risk, fully allowing attackers with administrative web credentials to…

Samsung Galaxy S24 Hacked at Pwn2Own Ireland 2024

Over $350,000 was paid out on day 2 of Pwn2Own Ireland 2024, including $50,000 for an exploit targeting the Samsung Galaxy S24.  The post Samsung Galaxy S24 Hacked at Pwn2Own Ireland 2024  appeared first on SecurityWeek. This article has been…

Nucleus Security unveils POAM Process Automation for federal agencies

Nucleus Security announced Nucleus POAM Process Automation, a comprehensive solution for federal agencies and their vendors to streamline risk management and automate their Plan of Action and Milestones (POA&M) process. This solution overcomes error-prone and labor-intensive manual processes by automating…

Guarding Digital Assets By Understanding Third-Party Access Risks

Companies depend on external partners to support operations and provide various services. Collaborating with contractors, consultants and auditors is often a necessity. However, the reliance on external resources also creates notable security concerns, as allowing partners to access the network…