Tag: EN

The NIS2 Directive: How far does it reach?

The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies,…

Ransomware Attacks Exposed 6.7 Million Records in US Schools

Ransomware attacks on US schools and colleges have surged, with 491 incidents since 2018, affecting over 8000 institutions This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Attacks Exposed 6.7 Million Records in US Schools

Deepfakes: Seeing is no longer believing

The threat of deepfakes lies not in the technology itself, but in people’s natural tendency to trust what they see. As a result, deepfakes don’t need to be highly advanced or convincing to effectively spread misinformation and disinformation. While many…

Why ransomware attackers target Active Directory

Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosoft, discusses the rise of ransomware attacks, why attackers…

Durex India spilled customers’ private order data

Durex India has exposed its sensitive customer data, including their full names, email IDs and order details. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original…

Third-party risk management is under the spotlight

In the aftermath of the CrowdStrike IT outage, new research has uncovered a critical vulnerability within financial institutions regarding supply chain resilience. The outage has demonstrated the need for greater digital supply chain resilience, particularly in vital sectors such as…

When Get-Out-The-Vote Efforts Look Like Phishing

Multiple media reports this week warned Americans to be on guard against a new phishing scam that arrives in a text message informing recipients they are not yet registered to vote. A bit of digging reveals the missives were sent…

3CX Phone System Local Privilege Escalation Vulnerability

Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. Recently, we decided to take a look at the 3CX…

Spotlight on Simbian

The race to adopt AI-driven solutions has opened up new opportunities for businesses but has also introduced unprecedented risks in data integrity, compliance, and governance. According to Gartner, 40% of… The post Spotlight on Simbian appeared first on Cyber Defense…

Innovator Spotlight: DNSFilter

In today’s digital age, cybersecurity can often feel like a daunting challenge, with the constant fear of being just one click away from a potential compromise. For Timothy (TK) Keanini,… The post Innovator Spotlight: DNSFilter appeared first on Cyber Defense…

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone would can tell you what happened op-ed  Microsoft will host a security summit next month with CrowdStrike and other “key” endpoint security partners joining the fun — and during which the CrowdStrike-induced…