'

CIOs and CFOs, two parts of the same whole

CIOs and CFOs, two parts of the same whole

The business boardroom: a machine that drives corporate strategy and shapes the future of the company. Such a force requires cohesion and alignment, but silos still exist today. One of the biggest divides lies between the Chief Finance Officer and Chief Information Officer. CFOs, the keepers of the bottom line, are driven by profitability, whereas … Read more

Threat Actors Accessed Cancer patients’ Data left Open by Testing Lab

Threat Actors Accessed Cancer patients’ Data left Open by Testing Lab

Guardant Health, a leading cancer screening and precision medicine company, has disclosed a data breach that left sensitive patient information publicly accessible online for over three years. The California-based firm, which has performed over 500,000 blood tests, is notifying an undisclosed number of individuals that an employee inadvertently exposed their private medical data. The data, … Read more

Cyber Attack On Data Center Cooling Systems Leads To Disruption

Cyber Attack On Data Center Cooling Systems Leads To Disruption

Critical operational elements such as data storage, processing, backups, and recovery heavily rely on Australian industrial organizations’ data centers. These facilities support various business functions, including productivity tools, transaction-intensive applications, big-data processing systems, and artificial intelligence (AI). The importance of data centers is manifest in the fact that the SOCI Act 2018 identifies them as … Read more

SocGholish Attacks Enterprises Via Fake Browser Updates

SocGholish Attacks Enterprises Via Fake Browser Updates

Enterprises are being targeted by the malware known as SocGholish through deceptive browser update prompts. This malware, notorious for its stealth and the complexity of its delivery mechanisms, has been identified in a series of incidents involving fake browser updates that trick users into downloading malicious payloads. ESentire has recently published a report highlighting the … Read more

Alert! Hackers Running Thousands of Fake Webshops : 850,000+ Cards Stolen

Alert! Hackers Running Thousands of Fake Webshops : 850,000+ Cards Stolen

A sprawling cybercrime network, “BogusBazaar,” has stolen credit card details from over 850,000 online shoppers, mainly in Western Europe and the United States, by operating tens of thousands of fraudulent e-commerce websites. Security researchers estimate that since 2021, the hackers have processed over 1 million fake orders totaling more than $50 million. Document Free Webinar … Read more

F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely

F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely

In a significant cybersecurity development, researchers have uncovered critical vulnerabilities in F5’s Next Central Manager, which could potentially allow attackers to gain full administrative control over the device. This alarming security flaw also creates hidden rogue accounts on any managed assets, posing a severe threat to organizations’ network infrastructures. F5, a leading networking and cybersecurity … Read more

Polish Government Under Sophisticated Cyber Attack From APT28 Hacker Group

Polish Government Under Sophisticated Cyber Attack From APT28 Hacker Group

The Polish computer emergency response team CERT.pl has issued a warning about an ongoing cyberattack campaign by the notorious APT28 hacking group, also known as Fancy Bear or Sofacy. The campaign is targeting various Polish government institutions with a new strain of malware. According to the CERT.pl analysis, the attack begins with spear-phishing emails containing … Read more

News alert: Security Risk Advisors offers free workshop to help select optimal OT security tools

News alert: Security Risk Advisors offers free workshop to help select optimal OT security tools

Philadelphia, Pa., May 8, 2024, CyberNewsWire — Security Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a complimentary offering designed to assist organizations in selecting the most suitable operational technology (OT) and Extended Internet of Things (XIoT) security tools for their unique environments. Led by seasoned OT/XIoT security consultants, the workshop … Read more

How CISA is Preparing For the Influx of CIRCIA Reports

How CISA is Preparing For the Influx of CIRCIA Reports

SAN FRANCISCO – The streamlining of incident reporting is a large part of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), and at RSA Conference this week, a CISA official outlined how it is laying the groundwork for the backend processes related to collecting and analyzing the information in these reports. In the weeks … Read more

Categories duo

To Fix IoT Security, ‘We Need to Aim at the Security Have-Nots’

To Fix IoT Security, ‘We Need to Aim at the Security Have-Nots’

SAN FRANCISCO–On the long and ever-growing list of security priorities for enterprises and SMBs, IoT devices tend to fall somewhere near the bottom, something that attackers of all stripes have gladly taken advantage of for many years. But government and private sector experts alike are working to change that through regulatory efforts, advocacy, and technical … Read more

Categories duo