As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at…
Category: Insights
Some Brother printers have a remote code execution vulnerability, and they can’t fix it
Two others, CVE-2024-51980 and CVE-2024-51981, enable server-side request forgery (SSRF), allowing printers to send crafted requests…
From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains
Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies…
CISA Issues Threat Warning After ‘Potential’ Oracle Cloud Breach
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning about the potential for increased security…
Krebs Leaves SentinelOne Amid Trump Administration Fight
Chris Krebs, the man at the center of President Donald Trump’s revoking of security clearances held…
ImageRunner Flaw Exposed Sensitive Information in Google Cloud
Google Cloud recently patched a privilege escalation vulnerability that could have allowed threat actors to gain…
Questions Remain Over Attacks Causing DrayTek Router Reboots
Taiwan-based networking equipment manufacturer DrayTek has shared some clarifications regarding the recent router reboots reported by…
AdCellerant Achieves SOC 2 Type 2 Compliance, Setting a New Standard for Data Security
AdCellerant has successfully passed its SOC2 2 Type 2 audit, reaffirming its commitment to security, compliance,…
Zest AI Expands Credit Union Fraud Protection Through Integration with Sync1 Systems
Zest AI, the leader in AI lending technology, today announced an expanded partnership with Sync1 Systems, an…
Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown
An international law enforcement operation has dismantled the domains associated with various online platforms linked to…