Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution VulnerabilityA vulnerability in the web-based management interface of Cisco Small Business RV160 and RV260...
Month: January 2023
Healthcare CISO Group Focuses on Third-Party Risk Challenges
Healthcare CISO Group Focuses on Third-Party Risk ChallengesTo help U.S. healthcare sector organizations better tackle some of the top challenges involving vendor risk management, a coalition...
Building powerful security into the fragmented IoT ecosystem
Building powerful security into the fragmented IoT ecosystemEXECUTIVE SUMMARY: Organizations are rapidly adopting connected technologies to drive innovation and digital transformation success. From aerospace, to agriculture,...
Ukraine War and Upcoming SEC Rules Push Boards to Sharpen Cyber Oversight
Ukraine War and Upcoming SEC Rules Push Boards to Sharpen Cyber OversightContenido de la entradaLeer másProofpoint News Feed
Cisco Network Services Orchestrator Path Traversal Vulnerability
Cisco Network Services Orchestrator Path Traversal VulnerabilityA vulnerability in the NETCONF service of Cisco Network Services Orchestrator (NSO) could allow an authenticated, remote attacker to cause...
World Economic Forum: Cyber crime and cyber insecurity a top global risk
World Economic Forum: Cyber crime and cyber insecurity a top global riskBy Cyber Talk Staff On the eve of the World Economic Forum (WEF) Annual Meeting...
Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities
Cisco TelePresence Collaboration Endpoint and RoomOS Software VulnerabilitiesMultiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, local attacker...
Cisco Webex Room Phone and Cisco Webex Share Link Layer Discovery Protocol Memory Leak Vulnerability
Cisco Webex Room Phone and Cisco Webex Share Link Layer Discovery Protocol Memory Leak VulnerabilityA vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco...
GUEST ESSAY: These common myths and misconceptions make online browsing very risky
GUEST ESSAY: These common myths and misconceptions make online browsing very riskyFor the average user, the Internet is an increasingly dangerous place to navigate. Related: Third-party...
Identifying and reducing risk faster in multi-cloud environments
Identifying and reducing risk faster in multi-cloud environmentsContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Cisco IP Phone 7800 and 8800 Series Web Management Interface Authentication Bypass Vulnerability
Cisco IP Phone 7800 and 8800 Series Web Management Interface Authentication Bypass VulnerabilityA vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800...
GUEST ESSAY: A new year, a familiar predicament — consumers face intensifying cybersecurity risks
GUEST ESSAY: A new year, a familiar predicament — consumers face intensifying cybersecurity risksAt the start of 2023, consumers remain out in the cold when it...
GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue
GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenueIn golf there’s a popular saying: play the course, not your opponent....
GUEST ESSAY: How ‘DPIAs” — data privacy impact assessments — can lead SMBs to compliance
GUEST ESSAY: How ‘DPIAs” — data privacy impact assessments — can lead SMBs to complianceAs the world becomes more digital and connected, it is no surprise...
Cisco Industrial Network Director Vulnerabilities
Cisco Industrial Network Director VulnerabilitiesMultiple vulnerabilities in Cisco Industrial Network Director (IND) could allow an attacker to access sensitive data or conduct cross-site scripting (XSS) attacks....
Cisco CX Cloud Agent Privilege Escalation Vulnerabilities
Cisco CX Cloud Agent Privilege Escalation VulnerabilitiesMultiple vulnerabilities in Cisco CX Cloud Agent could allow an authenticated, local attacker to elevate privileges. These vulnerabilities are due...
Can I tell you a secret? Episode five: a mother’s love
Can I tell you a secret? Episode five: a mother’s loveRevisited: Journalist Sirin Kale meets Matthew Hardy’s mother to uncover more about his past – and...
Can I tell you a secret? Episode four: a reckoning
Can I tell you a secret? Episode four: a reckoningRevisited: Matthew Hardy’s victims come face to face with him as an attempt is made to stop...
Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability
Cisco Unified Intelligence Center Reflected Cross-Site Scripting VulnerabilityA vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to...
Can I tell you a secret? Episode six: the winding clock | podcast
Can I tell you a secret? Episode six: the winding clock | podcastRevisited: As the years tick by, journalist Sirin Kale speaks to victims and those...
LIVE Webinar | 3 Must-Have Components for Successful Ransomware Recovery
LIVE Webinar | 3 Must-Have Components for Successful Ransomware RecoveryContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Second cabinet minister says Twitter account hacked
Second cabinet minister says Twitter account hackedNorthern Ireland secretary Chris Heaton-Harris apologises after account posts ‘deeply unpleasant stuff’ UK politics live – latest news updates A...
Cisco BroadWorks Application Delivery Platform, Application Server, and Xtended Services Platform Cross-Site Scripting Vulnerability
Cisco BroadWorks Application Delivery Platform, Application Server, and Xtended Services Platform Cross-Site Scripting VulnerabilityA vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform,...
Can I tell you a secret? Episode seven: an update – podcast
Can I tell you a secret? Episode seven: an update – podcastRevisited: Guardian producer Lucy Hough and reporter Matthew Weaver give an update on the outcome...
Russian hackers targeted US nuclear research laboratories, records reveal
Russian hackers targeted US nuclear research laboratories, records revealCold River team launched attack on three facilities last summer as it escalates hacking campaign against Ukraine’s allies...
Cisco Prime Data Center Network Manager File Information Disclosure Vulnerability
Cisco Prime Data Center Network Manager File Information Disclosure VulnerabilityCisco Prime Data Center Network Manager (DCNM) contains a file information disclosure vulnerability that could allow an...
Scam Facebook ads using fake images of PM Albanese being ‘arrested’ removed from site
Scam Facebook ads using fake images of PM Albanese being ‘arrested’ removed from siteSocial media page pushing 51 fake ads featuring Australian prime minister and attracting...
Darktrace shares fall below IPO price as new client sign-ups slow
Darktrace shares fall below IPO price as new client sign-ups slowCybersecurity firm hits lowest level since flotation as co-founder fights extradition to US on fraud charges...
Live Webinar | Your Ultimate Phishing Trend Benchmarking and Guide to Mitigation
Live Webinar | Your Ultimate Phishing Trend Benchmarking and Guide to MitigationContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Royal Mail overseas post badly disrupted after cyber incident
Royal Mail overseas post badly disrupted after cyber incidentCompany asks customers not to send international parcels and letters as it informs security authorities Royal Mail has...