Global operation EMERALDWHALE steals 15K cloud credentials Jordyn Alger October 31, 2024 A global operation called EMERALDWHALE has resulted in the theft of more than 15,000 cloud service credentials. Read More
Software and IT vendors linked to 67% of energy sector breaches Jordyn Alger October 30, 2024 Two-thirds (67%) of third-party energy sector breaches were caused by software and IT vendors. Read More
Security leaders discuss the Cisco security incident Jordyn Alger October 29, 2024 Security leaders discuss the recent Cisco security incident. Read More
5 Minutes With How organizations can defend against the increasing API attack surface Jordyn Alger October 29, 2024 As APIs increase beyond the range of manual control, organizations may face greater security challenges.Read More
67% of organizations say employees lack basic security awareness Jordyn Alger October 24, 2024 67% of organizations are concerned that employees lack fundamental security awareness. Read More
New macOS vulnerability allows unauthorized data access Jordyn Alger October 24, 2024 A new macOS vulnerability could allow a malicious actor to evade an operating system’s Transparency, Consent, and Control (TCC) technology. Read More
CISOs respond: 49% of CISOs plan to leave role without industry action Jordyn Alger October 23, 2024 A survey shows that nearly half (49%) of CISOs do not believe there is a future for them in this role. CISOs are sharing their insights on this statistic. Read More
Iranian cyber actors are targeting critical infrastructure entities Jordyn Alger October 22, 2024 Iranian cyber actors are targeting critical infrastructure entities via brute force.Read More
Research uncovers new attack method, security leaders share insights Jordyn Alger October 22, 2024 Researchers at the University of Texas at Austin discovered a new attack method. Read More
SolarWinds Help Desk software vulnerability added to CISA catalogue Jordyn Alger October 21, 2024 Due to evidence of active exploitation, CISA added three vulnerabilities to its Known Exploited Vulnerabilities Catalogue.Read More