Apple has warned at least six Indian politicians and other members of political parties and one journalist of their iPhones being targets of state-sponsored attacks, these people said Tuesday. Shashi Tharoor of the opposition Congress party, Mahua Moitra, a national…
Tag: EN
Stop what you’re doing and patch this critical Confluence flaw, warns Atlassian
Risk of ‘significant data loss’ for on-prem customers Atlassian has told customers they “must take immediate action” to address a newly discovered flaw in its Confluence collaboration tool.… This article has been indexed from The Register – Security Read the…
A closer look at healthcare’s battle with AI-driven attacks
With its wealth of sensitive patient data, the healthcare industry has become a prime target for cybercriminals leveraging AI tools. As these threats continue to evolve, it’s important to understand how AI is shaping the cybercrime landscape in healthcare and…
The hidden costs of data breaches for small businesses
Nearly 8 in 10 small business leaders admit they are anxious about the safety of their company’s sensitive data and information, according to Shred-it. According to the Identity Theft Resource Center’s report, the number of data breaches remains in line…
Vulnerability management metrics: How to measure success
Without the right metrics, vulnerability management is pretty pointless. If you’re not measuring, how do you know it’s working? So how do you know what to focus on? The list is potentially endless, and it can be hard to know…
Simplify User Access with Federated Identity Management
Discover the power of federated identity management for seamless SSO and enhanced user access. Improve security and streamline authentication The post Simplify User Access with Federated Identity Management appeared first on Security Boulevard. This article has been indexed from Security…
The PEAK Threat Hunting Framework
Organizations rely on threat hunting to identify malicious activity, improve security and mitigate risk. The PEAK Threat Hunting Framework — a practical, vendor-agnostic, customizable approach to threat hunting, designed to help organizations create or refine their threat hunting programs —…
SolarWinds allegedly misled public on its security before Sunburst cyberattack: SEC
Regulator alleges company painted a false picture of its cyber controls; SolarWinds CEO calls charges This article has been indexed from IT World Canada Read the original article: SolarWinds allegedly misled public on its security before Sunburst cyberattack: SEC
SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures
The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks. The post SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures appeared first on SecurityWeek. This article has been…
Chen to leave BlackBerry at the end of the week
After a decade of trying to resuscitate BlackBerry Ltd., John Chen is leaving the company. In a statement issued this afternoon, the company announced the executive chair and CEO will retire effective Nov. 4. Richard (Dick) Lynch will succeed Chen…