fbpx
Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters | Ars Technica

Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters | Ars Technica

Incomplete information included in recent disclosures by Apple and Google reporting critical zero-day vulnerabilities under active exploitation in their products has created a “huge blindspot” that’s causing a large number of offerings from other developers to go unpatched, researchers said Thursday. Two weeks ago, Apple reported that threat actors were actively exploiting a critical vulnerability […]

Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters | Ars Technica Read More »

AI-assisted Cybersecurity: Don't Miss These 3 Vital Components

AI-assisted Cybersecurity: Don’t Miss These 3 Vital Components

Presented by Zscaler Early in 2023, we saw the explosive use of OpenAI’s ChatGPT accompanied by laymen fears of the Artificial General Intelligence (AGI) revolution and forecasted disruptions to markets. Without a doubt, AI will have a massive and transformative impact on much of what we do, but the time has come for a more

AI-assisted Cybersecurity: Don’t Miss These 3 Vital Components Read More »

AI-assisted cybersecurity: 3 key components you can't ignore | VentureBeat

AI-assisted cybersecurity: 3 key components you can’t ignore | VentureBeat

Presented by Zscaler Early in 2023, we saw the explosive use of OpenAI’s ChatGPT accompanied by laymen fears of the Artificial General Intelligence (AGI) revolution and forecasted disruptions to markets. Without a doubt, AI will have a massive and transformative impact on much of what we do, but the time has come for a more

AI-assisted cybersecurity: 3 key components you can’t ignore | VentureBeat Read More »

Rethinking Backup Storage: An In-Depth Look at Actiphy StorageServer™

Rethinking Backup Storage: An In-Depth Look at Actiphy StorageServer™

Raising the Bar in Backup Storage: The Actiphy StorageServer™ Advantage If you’re an IT pro, you already know that protecting your data goes beyond just making backups; it’s also about where and how you’re storing those backups. Let’s introduce you to a next-level game-changer in this realm: Actiphy StorageServer™. Here, we’ll unpack its key features and

Rethinking Backup Storage: An In-Depth Look at Actiphy StorageServer™ Read More »

Anticipating 2023: Emerging Cybersecurity Threats And Trends To Monitor

Anticipating 2023: Emerging Cybersecurity Threats And Trends To Monitor

As we step into 2023, the digital landscape continues to evolve at a rapid pace, bringing both opportunities and challenges. The realm of cybersecurity is no exception, with new threats and trends constantly emerging. To protect our digital lives and assets effectively, it is crucial to stay ahead of the curve by anticipating these emerging

Anticipating 2023: Emerging Cybersecurity Threats And Trends To Monitor Read More »

Supporting Africa’s Cybersecurity Talent Makes the World Safer

Depending on your perspective, Africa is either a global asset or a liability in the information security (infosec) world — or a bit of both. Many people unfairly portray African nations solely as malicious hackers and scammers. Nigeria bears the most accusations with frequent mentions of Nigerian prince scams. While threat actors such as the

Supporting Africa’s Cybersecurity Talent Makes the World Safer Read More »

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers

An ongoing campaign is targeting Facebook Business accounts with bogus messages to harvest victims’ credentials using a variant of the Python-based NodeStealer and potentially take over their accounts for follow-on malicious activities. “The attacks are reaching victims mainly in Southern Europe and North America across different segments, led by the manufacturing services and technology sectors,”

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers Read More »

"Embrace cybersecurity automation and orchestration, but in moderation," says my puppy | VentureBeat

“Embrace cybersecurity automation and orchestration, but in moderation,” says my puppy | VentureBeat

An automatic dog feeder seemed like a good idea at the time. One of our team members had a COVID puppy, Mango, who ate constantly, and their kids had long abandoned the promises to help. All was good until a malfunction dumped a pound of dog food on Mango mid-feed. The “brave” puppy was too

“Embrace cybersecurity automation and orchestration, but in moderation,” says my puppy | VentureBeat Read More »

Federal Mandates on Medical-Device Cybersecurity Get Serious

Federal Mandates on Medical-Device Cybersecurity Get Serious

For six months, medical device makers have had to comply with new cybersecurity regulations aimed at hardening medical devices against cyber attacks, but the US Food and Drug Administration has largely refrained from using its “refuse to accept” power up to now.  On Oct. 1, the FDA’s grace period — during which the agency stated

Federal Mandates on Medical-Device Cybersecurity Get Serious Read More »

How to Mitigate Cybersecurity Risks From Misguided Trust

How to Mitigate Cybersecurity Risks From Misguided Trust

Kroll’s “2023 State of Cyber Defense” report includes some noteworthy findings about today’s cybersecurity landscape. First, despite experiencing an average of five significant security incidents last year, only 37% of senior security executives have “complete” faith in their organization’s ability to shield against all forms of cyber threats. Second, security teams rely on multiple cybersecurity

How to Mitigate Cybersecurity Risks From Misguided Trust Read More »

Scroll to Top