US indicts one for role in BreachForums, France arrests four others

Prosecutors allege West stole and sold data from entities spanning government agencies, telecoms providers, tech giants…

AMI MegaRAC flaw is under attack, CISA warns, so patch it — if you can

The spoofing attack works by manipulating HTTP request headers sent to the Redfish interface. Attackers can…

Cisco warns of critical API vulnerabilities in ISE and ISE-PIC

Furthermore, the vulnerabilities are not dependent on one another, Cisco stresses in its advisory. Exploitation of…

Don’t trust that email: It could be from a hacker using your printer to scam you

In the campaign observed by Varonis’ forensics experts, the attacker used PowerShell to send emails that…

Was CISOs von Moschusochsen lernen können

Das ist die Essenz dessen, was ich als “Moschusochsenstrategie” bezeichne. Der Hintergrund: Werden Moschusochsen von Wölfen…

The CSO guide to top security conferences

Blue Team Con 2024, Chicago, Illinois: 4-7 September Gartner IT Symposium/Xpo, Queensland, Australia: 8-11 September 16th…

Diese Unternehmen hat es schon erwischt

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind. Roman Samborskyi | shutterstock.com Sie…

6 key trends redefining the XDR market

The extended detection and response (XDR) market is experiencing significant growth, driven by escalating cybersecurity threats…

The rise of the compliance super soldier: A new human-AI paradigm in GRC

As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at…

Some Brother printers have a remote code execution vulnerability, and they can’t fix it

Two others, CVE-2024-51980 and CVE-2024-51981, enable server-side request forgery (SSRF), allowing printers to send crafted requests…