Historically, the utility industry has been thought of as reliable, slow moving, and heavily regulated. People want to know that their lights will turn on and water will run, and by prioritizing that consistency, the general public and regulators have…
Category: Cybersecurity Insiders
Google Android to lock screen of stolen smart phones with AI
Google is gearing up to introduce a groundbreaking feature aimed at enhancing smartphone security through the power of Artificial Intelligence (AI) in its upcoming Android 15 operating system. The tech giant, a subsidiary of Alphabet Inc., is poised to unveil…
Cybereason announces the availability of Cybereason Mobile Threat Defense
Cybereason, the leader in future-ready attack protection, today announced the availability of Cybereason Mobile Threat Defense, powered by Zimperium. This is in response to the continued growth towards mobile-powered business and also sophisticated security risks that are on the increase,…
New Apple iOS security update blocks Bluetooth Spying
Apple has unveiled significant security enhancements with the introduction of iOS 17.5, addressing nearly 15 vulnerabilities. Among the key features is a capability to thwart Bluetooth-based iPhone tracking, a move aimed at bolstering user privacy. The latest iOS update, version…
Patient sues Ascension after BlackBasta Ransomware attack
A woman, whose identity has been protected, is taking legal action against Ascension Seton, alleging negligence in safeguarding patient data from ransomware attackers. This individual, hailing from Hays County, was admitted to Ascension Seton Williamson Hospital in Round Rock in…
Strategies for Achieving Security Success in Mobile Application Management
In today’s digital era, where mobile devices play an integral role in both personal and professional lives, effective Mobile Application Management (MAM) is crucial for organizations aiming to streamline operations, enhance productivity, and ensure data security. Successfully managing mobile applications…
Cyber attack on Christies halts auction services to a certain extent
Christie’s, the renowned British auction house founded in 1766 by James Christie, has reportedly fallen victim to a cyber attack, potentially impacting its online auction services. Despite this setback, the London-based auction house remains optimistic that its phone and in-house…
Zcaler ThreatLabz 2024 VPN Risk Report
Today’s distributed and cloud-centric work environment has triggered a shift in access methods from traditional virtual private networks (VPNs) to more robust security frameworks like zero trust. Traditionally, VPNs provided essential remote access capabilities to connect users or entire office…
Free Workshop from Security Risk Advisors Empowers Organizations to Select Optimal OT Security Tools
Philadelphia, Pennsylvania, May 8th, 2024, CyberNewsWire Security Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a complimentary offering designed to assist organizations in selecting the most suitable operational technology (OT) and Extended Internet of Things (XIoT)…
Hunters Announces Full Adoption of OCSF and Introduces OCSF-Native Search
San Francisco, United States, May 7th, 2024, CyberNewsWire Hunters, the pioneer in modern SOC platforms, today announced its full adoption of the Open Cybersecurity Schema Framework (OCSF), coupled with the launch of groundbreaking OCSF-native Search capability. This strategic advancement underscores…