Tag: EN

Trellix ZTS enables organizations to strengthen cyber resilience

Trellix announced the Trellix Zero Trust Strategy (ZTS) Solution, available immediately worldwide. Trellix ZTS is leveraging Trellix’s AI-powered XDR Platform to provide native monitoring, protection, and threat detection. The solution enables organizations to establish security hygiene and strengthen cyber resilience…

Exploring Advanced Tripwire Enterprise Capabilities

In today’s digital landscape, it is important for organizations to depend upon the tools they use for cybersecurity. Large businesses can employ many security solutions, practices, and policies that must combine to create a robust and layered security strategy. While…

Multiple Ivanti Connect Secure Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in the Ivanti Connect Secure and Policy Secure Gateways. These vulnerabilities were associated with Heap overflow, null pointer dereference, and XML entity Expansion. These vulnerabilities have been assigned with CVEs CVE-2024-21894, CVE-2024-22052, CVE-2024-22053, and…

Face-to-Face 2024 Australia

The OpenSSL Project has returned from spending a week in February sequestered in the beautiful Australian outback discussing the past, current, and future state of the project. This in-person meeting brought together the project’s paid resources and the management committee.…

FBI shares some valuable insights on ransomware

The FBI, America’s premier law enforcement agency, has released a comprehensive report shedding light on the ongoing ransomware threat landscape. Here’s a summary of the key insights: Intermittent Encryption Tactics: Notably, the report highlights a common tactic among the top…

Seven tips to find spyware on a smart phone

To determine if your phone has spyware installed, you can follow these steps: 1.Check for Suspicious Apps: Review the list of installed apps on your phone. Look for any unfamiliar or suspicious apps that you don’t remember downloading. Spyware often…

Impact of IoT Security for 5G Technology

5G technology impacts not just our daily lifestyle but the Internet of Things (IoT) as well. The world of 5G is not only transformed by hyper-connectivity but is also involved in the future hinges on a critical element: IoT security.…

Security pros are cautiously optimistic about AI

55% of organizations plan to adopt GenAI solutions within this year, signaling a substantial surge in GenAI integration, according to a Cloud Security Alliance and Google Cloud survey. The survey received 2,486 responses from IT and security professionals. The report…

Cybercriminal adoption of browser fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years,…

Feds Patching Years-Old SS7 Vulnerability in Phone Networks

The FCC’s Public Safety and Homeland Security Bureau is seeking input on how communication service providers are securing SS7 and Diameter protocols to prevent location-tracking vulnerabilities.  The protocols are crucial for call routing, network interconnection, and data exchange in mobile…

22% of employees admit to breaching company rules with GenAI

Disruptive technologies like AI are heightening the longstanding tension between organizational security and employee productivity, according to 1Password. Employees are under increasing pressure to perform; to boost efficiency they’re embracing generative AI, hybrid and remote work, and unapproved applications and…