More than 22,000 users of Blink Mobility should take the necessary steps to protect themselves against the risk of identity theft. The Cybernews research team has discovered that their personal data was exposed in a leak. Los Angeles-based electric car-sharing…
Tag: EN
IAM & Detection Engineering
Introduction In the ever-changing cybersecurity landscape, Identity and Access Management (IAM) stands as the cornerstone of an organisation’s digital asset protection. IAM solutions play an essential role in managing user identities, controlling access to resources and ensuring compliance. As the…
Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware
Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of malware called Agent Tesla. The infection chains leverage decoy Excel documents attached in invoice-themed messages to trick potential targets into opening them and…
Why data, AI, and regulations top the threat list for 2024
The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare for the forthcoming challenges. Let’s explore the three…
How companies should recover when password breach occurs
Undoubtedly, every business worldwide is susceptible to cyber attacks and data breaches. The imperative response lies in implementing proactive measures to safeguard against such attacks and establishing an efficient disaster recovery plan for unforeseen events. Addressing password breaches, hackers frequently…
Key Takeaways from the Gartner® Market Guide for Insider Risk Management
Insider risk incidents are on the rise and becoming more costly to contain. As a result, earlier this year, Gartner predicted that 50% of all medium to large enterprises would adopt insider risk programs. To help organizations understand what they…
A closer look at the manufacturing threat landscape
The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing cybersecurity challenges. In this Help Net Security video, Kory Daniels, CISO at Trustwave, discusses recent comprehensive research highlighting the…
Data loss prevention isn’t rocket science, but NASA hasn’t made it work in Microsoft 365
Privacy review finds breach response plan is a mess, training could be better, but protection regime mostly holds up NASA’s Office of Inspector General has run its eye over the aerospace agency’s privacy regime and found plenty to like –…
Are organizations moving away from passwords?
Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys—sophisticated cryptographic tools designed to authenticate users with a level of sophistication and reliability that transcends…
How executives adapt to rising cybersecurity concerns in mobile networks
In this Help Net Security video, Rowland Corr, VP & Head of Government Relations at Enea, discusses the implications of burner phones and the crisis of confidence in network operators as they struggle to protect consumers from sophisticated (usually state-sponsored)…
86% of cyberattacks are delivered over encrypted channels
Threats over HTTPS grew by 24% from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels, according to Zscaler. For the second year in a row, manufacturing was the industry most commonly targeted, with education and government…
Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild – Update ASAP
Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day flaw that it said has been exploited in the wild. The vulnerability, assigned the CVE identifier CVE-2023-7024, has been described as a heap-based buffer overflow bug in…
To Xfinity’s Breach and Beyond – The Fallout from “CitrixBleed”
On December 18, 2023, Comcast Xfinity filed a notice to the Attorney General of Maine disclosing an exploited vulnerability in one of Xfinity’s software providers, Citrix, that has jeopardized almost 36 million customers’ sensitive information. While the vulnerability was made…
Ransomware Attacks: Are You Self-Sabotaging?
[By Andy Hill, Executive Vice President, Nexsan] No IT professional is unaware of the staggering risk of ransomware. In 2023, recovering from a ransomware attack cost on average $1.82 million—not including paying any ransom—and some organizations get hit more than…
Cybersecurity Tips to Stay Safe this Holiday Season
[By Craig Debban, CISO of QuSecure] Have you ever been on a trip and realized that you forgot to pack something important? It’s easy to overlook things during the hustle and bustle of traveling, especially during the holidays. Unfortunately, cybercriminals…
Why RV Connex Chose Swimlane As “The Powerhouse” Of Their SOC
The post Why RV Connex Chose Swimlane As “The Powerhouse” Of Their SOC appeared first on AI Enabled Security Automation. The post Why RV Connex Chose Swimlane As “The Powerhouse” Of Their SOC appeared first on Security Boulevard. This article…
Role of Parents in Teaching Online Safety
In today’s digital landscape, where children are increasingly exposed to the vast world of the internet, the role of parents in teaching online safety has… The post Role of Parents in Teaching Online Safety appeared first on Security Zap. This…
Addressing Cyberbullying and Online Harassment
Cyberbullying and online harassment have become significant concerns in today’s digital landscape. With the rise of social media platforms and online forums, it is crucial… The post Addressing Cyberbullying and Online Harassment appeared first on Security Zap. This article has…
Google addressed a new actively exploited Chrome zero-day
Google has released emergency updates to address a new actively exploited zero-day vulnerability in the Chrome browser. Google has released emergency updates to address a new zero-day vulnerability, tracked as CVE-2023-7024, in its web browser Chrome. The flaw has been…
German police seized the dark web marketplace Kingdom Market
The German police seized the dark web marketplace Kingdom Market as a result of an international law enforcement operation. The Federal Criminal Police Office in Germany (BKA) and the internet-crime combating unit of Frankfurt (ZIT), along with law enforcement agencies…