Schneider Electric Investigating Security ‘Incident’ After Reported Hacker Claims

Schneider Electric confirmed Monday that a developer platform used by the company was impacted by a…

Cynomi Hires Security Vet Ken Marks As CRO To Drive vCISO Platform Growth

Cynomi, an MSP-focused startup whose vCISO platform is tailored toward securing small and medium-sized enterprises, announced…

New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called…

Leveraging Wazuh for Zero Trust security

Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously…

Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack

Cisco on Wednesday said it has released updates to address an actively exploited security flaw in…

Fortinet: ‘Critical’ FortiManager Vulnerability Is Seeing Exploitation

Fortinet disclosed Wednesday that a critical-severity vulnerability affecting numerous versions of FortiManager has seen exploitation in…

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some…

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign…

Graylog Redefines SIEM with More Efficient and Effective Threat Detection

These enhancements, and many others in the Fall 2024 release, help organizations realign their time and…

ESET Distributor’s Systems Abused to Deliver Wiper Malware 

ESET has launched an investigation after the systems of its official product distributor in Israel were…