Prosecutors allege West stole and sold data from entities spanning government agencies, telecoms providers, tech giants…
Category: Insights
AMI MegaRAC flaw is under attack, CISA warns, so patch it — if you can
The spoofing attack works by manipulating HTTP request headers sent to the Redfish interface. Attackers can…
Cisco warns of critical API vulnerabilities in ISE and ISE-PIC
Furthermore, the vulnerabilities are not dependent on one another, Cisco stresses in its advisory. Exploitation of…
Don’t trust that email: It could be from a hacker using your printer to scam you
In the campaign observed by Varonis’ forensics experts, the attacker used PowerShell to send emails that…
Was CISOs von Moschusochsen lernen können
Das ist die Essenz dessen, was ich als “Moschusochsenstrategie” bezeichne. Der Hintergrund: Werden Moschusochsen von Wölfen…
The CSO guide to top security conferences
Blue Team Con 2024, Chicago, Illinois: 4-7 September Gartner IT Symposium/Xpo, Queensland, Australia: 8-11 September 16th…
Diese Unternehmen hat es schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind. Roman Samborskyi | shutterstock.com Sie…
6 key trends redefining the XDR market
The extended detection and response (XDR) market is experiencing significant growth, driven by escalating cybersecurity threats…
The rise of the compliance super soldier: A new human-AI paradigm in GRC
As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at…
Some Brother printers have a remote code execution vulnerability, and they can’t fix it
Two others, CVE-2024-51980 and CVE-2024-51981, enable server-side request forgery (SSRF), allowing printers to send crafted requests…