The rise of the compliance super soldier: A new human-AI paradigm in GRC

As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at…

Some Brother printers have a remote code execution vulnerability, and they can’t fix it

Two others, CVE-2024-51980 and CVE-2024-51981, enable server-side request forgery (SSRF), allowing printers to send crafted requests…

From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains

Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies…

CISA Issues Threat Warning After ‘Potential’ Oracle Cloud Breach

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning about the potential for increased security…

Krebs Leaves SentinelOne Amid Trump Administration Fight

Chris Krebs, the man at the center of President Donald Trump’s revoking of security clearances held…

ImageRunner Flaw Exposed Sensitive Information in Google Cloud

Google Cloud recently patched a privilege escalation vulnerability that could have allowed threat actors to gain…

Questions Remain Over Attacks Causing DrayTek Router Reboots

Taiwan-based networking equipment manufacturer DrayTek has shared some clarifications regarding the recent router reboots reported by…

AdCellerant Achieves SOC 2 Type 2 Compliance, Setting a New Standard for Data Security

AdCellerant has successfully passed its SOC2 2 Type 2 audit, reaffirming its commitment to security, compliance,…

Zest AI Expands Credit Union Fraud Protection Through Integration with Sync1 Systems

 Zest AI, the leader in AI lending technology, today announced an expanded partnership with Sync1 Systems, an…

Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown

An international law enforcement operation has dismantled the domains associated with various online platforms linked to…