In the cloud, patches disseminate automatically. On your computer, you get notified. IoT devices, meanwhile, can escape attention for years on end.
FTC Slams TikTok With Lawsuit After Continued COPPA Violations
Though TikTok is expected to adhere to certain COPPA-outlined measures, the social media giant has failed to meet those expectations, the Feds allege.
Critical Apache OFBiz Vulnerability Allows Preauth RCE
The enterprise resource planning platform bug CVE-2024-38856 has a vulnerability-severity score of 9.8 out of 10 on the CVSS scale and offers a wide avenue into enterprise applications for cyberattackers.
China’s Evasive Panda Attacks ISP to Send Malicious Software Updates
The APT used DNS poisoning to install the Macma backdoor on targeted networks and then deliver malware to steal data via post-exploitation activity.
Evasive Panda скомпрометировала интернет-провайдера ради распространения малвари
Эксперты Volexity обнаружили, что в 2023 году китайская хак-группа скомпрометировала неназванного интернет-провайдера, чтобы внедрить малварь в автоматические обновления ПО, которые осуществлялись через HTTP. …
Startup Spotlight: Knostic Tackles AI’s Oversharing Problem
Cybersecurity startup Knostic, a finalists in this year’s Black Hat USA Startup Spotlight competition, adds guardrails to how AI uses enterprise data to ensure sensitive data does not get leaked.
Startup Spotlight: LeakSignal Helps Plug Leaky Data in Organizations
Cybersecurity startup LeakSignal, a finalists in this year’s Black Hat USA Startup Spotlight competition, helps organizations see where data is leaking within their environment.
Правоохранители закрыли платформу для телефонных мошенников Russian Coms
Национальное агентство по борьбе с преступностью Великобритании (NCA) сообщило о закрытии Russian Coms, крупной платформы для спуфинга информации о вызывающем абоненте (Caller ID). Услугами этой платформы пользовались сотни преступников, совершивших бо…
Protect Data Differently for a Different World
Adopting a military mindset toward cybersecurity means the industry moves beyond the current network protection strategies and toward a data-centric security approach.
Protect Data Differently for a Different World
Adopting a military mindset toward cybersecurity means the industry moves beyond the current network protection strategies and toward a data-centric security approach.