Harrods, the world-renowned luxury department store in Knightsbridge, has confirmed it was the target of a sophisticated cyberattack, marking it as the third major UK retailer to be hit by cybercrime within a week. The news follows similar incidents reported…
Category: EN
Trellix Unveils New Phishing Simulator to Proactively Identify & Mitigate Phishing Attacks
In a significant advancement for cybersecurity training, Trellix has introduced its new Phishing Simulator, designed to strengthen organizational defenses against one of the most persistent threat vectors in today’s digital landscape. Announced on April 29, 2025, this comprehensive solution enables…
CISA Warns of Apache HTTP Server Escape Vulnerability Exploited in the Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-38475, a critical vulnerability affecting Apache HTTP Server, to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability allows attackers to map URLs to unintended filesystem locations, potentially leading to code execution…
India Takes Bold Steps to Protect Citizens from Cyber Fraud: The Introduction of New Domain Names for Banks
India, now officially the most populous country in the world after surpassing China, is taking a significant step to safeguard its citizens from the growing threats of financial fraud and cyber scams. Under the leadership of Prime Minister Narendra Modi,…
AI and automation shift the cybersecurity balance toward attackers
Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. The post AI and automation shift the cybersecurity balance toward attackers appeared first on Help Net Security. This…
Anviz unveils biometric access control solution
Anviz launched W2 Face, its latest hybrid biometric access control and attendance terminal. Designed to meet the needs of modern enterprises, the W2 Face combines facial recognition, fingerprint authentication, and RFID capabilities in a compact, intelligent device. Responding to market…
Cybersecurity News Roundup: Book Deals, Retail Attacks, Apple Spyware Alerts, and More
In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer’s, are detailed, highlighting…
CISA Issues Alert on Actively Exploited Apache HTTP Server Escape Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a newly discovered and actively exploited vulnerability in the widely used Apache HTTP Server. The flaw, catalogued as CVE-2024-38475, affects the server’s mod_rewrite module and poses significant…
Phone theft is turning into a serious cybersecurity risk
Phone theft is a rising issue worldwide, and it’s more than just a property crime. It’s a serious cybersecurity threat. In the UK alone, the Metropolitan Police recovers 1,000 phones each week. Stolen phones don’t just go to local black…
Disney Hacker Admits Guilt After Stealing 1.1TB of Internal Data
A 25-year-old man from Santa Clarita, California, has agreed to plead guilty to hacking into the personal computer of a Walt Disney Company employee and stealing a massive amount of sensitive internal data last year. Ryan Mitchell Kramer faces charges…
People know password reuse is risky but keep doing it anyway
35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10% reported always updating compromised passwords. 38% of Gen Z and 31% of Millennials only change…
Zero Trust Implementation – A CISO’s Essential Resource Guide
Zero Trust implementation is essential in today’s rapidly evolving digital landscape, as traditional perimeter-based security can no longer defend against sophisticated cyber threats. The rise in remote work, cloud adoption, and interconnected systems has expanded the attack surface, making it…
The CISO’s Role in Securing IoT in a Connected World
The rapid proliferation of IoT devices from smart manufacturing sensors to healthcare wearables—has transformed organizational operations and expanded risk landscapes, making Securing IoT for CISOs a growing priority. For Chief Information Security Officers (CISOs), this evolution demands a recalibration of…
How CISOs Can Leverage Threat Intelligence to Stay Proactive
In today’s digital era, Chief Information Security Officers (CISOs) are under immense pressure to protect their organizations from increasingly sophisticated cyber threats. The threat landscape is dynamic, with adversaries constantly evolving their tactics and exploiting new vulnerabilities. Traditional reactive security…
Building a Resilient Cyber Defense – CISO Strategies Unveiled
In today’s hyperconnected business environment, building a resilient cyber defense is crucial. Cyber threats have evolved into persistent and sophisticated challenges that jeopardize organizational stability. Chief Information Security Officers (CISOs) now operate at the frontline of an invisible war, where…
How CISOs Can Successfully Lead Security Transformation in Hybrid Work Environments
As organizations increasingly adopt hybrid work models, Chief Information Security Officers (CISOs) face new and complex challenges. The traditional boundaries of enterprise security have dissolved, and sensitive data now flows across home offices, cloud platforms, and corporate networks. This shift…
Infosec products of the month: April 2025
Here’s a look at the most interesting products from the past month, featuring releases from: 1touch.io, Abnormal AI, AppViewX, Arctic Wolf Networks, Bitdefender, BitSight, Bugcrowd, Cato Networks, CyberQP, Cyware, Entrust, Exabeam, Flashpoint, Forescout, Index Engines, Jit, LastPass, PlexTrac, PowerDMARC, RunSafe…
Half of red flags in third-party deals never reach compliance teams
Third-party risk management (TPRM) is compromised in many organizations because those holding the relationship with the third-party (relationship owners) don’t escalate red flags to compliance teams reliably, according to Gartner. The post Half of red flags in third-party deals never…
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks This article has been indexed from WeLiveSecurity Read the original article: TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
The CISO’s Playbook for Managing Third-Party Vendor Risks
In today’s interconnected business landscape, organizations increasingly rely on third-party vendors to provide specialized services, enhance operational efficiency, and reduce costs. However, with 98% of companies exposed to risks via these external relationships, vendor risk management has become a critical…