Source: www.csoonline.com – Author: While the category is aging, the need for better automation and leveraging AI is still very much needed to defend the enterprise...
Year: 2025
IPVanish VPN Review: Is It Really as Secure as Claimed? – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Luis Millares We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not...
Zero-day exploits plague Ivanti Connect Secure appliances for second year running – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones The cybersecurity industry is urging those in charge of defending their orgs to take mitigation efforts “seriously” as Ivanti battles...
Security pros baited with fake Windows LDAP exploit traps – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Security researchers are once again being lured into traps by attackers, this time with fake exploits of serious Microsoft security...
Japanese police claim China ran five-year cyberattack campaign targeting local orgs – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Japan’s National Police Agency and Center of Incident Readiness and Strategy for Cybersecurity have confirmed third party reports of attacks...
Database tables of student, teacher info stolen from PowerSchool in cyberattack – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson A leading education software maker has admitted its IT environment was compromised in a cyberattack, with students and teachers’ personal...
I tried hard, but didn’t fix all of cybersecurity, admits outgoing US National Cyber Director – Source: go.theregister.com
Source: go.theregister.com – Author: Brandon Vigliarolo The outgoing leader of the United States’ Office of the National Cyber Director has a clear message for whomever President-elect...
Fancy Product Designer Plugin Flaws Expose WordPress Sites – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Two significant security vulnerabilities have been identified in the Fancy Product Designer premium plugin, which allows the customization of WooCommerce products. The...
Japan Faces Prolonged Cyber-Attacks Linked to China’s MirrorFace – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A prolonged cyber-attack campaign targeting Japanese organizations and individuals since 2019 has been attributed to the China-linked threat actor MirrorFace, also known...
PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: North American school software provider PowerSchool has reportedly paid a ransom to prevent attackers from releasing stolen data of students and teachers....
EU Commission Liable for Breaching EU’s Own Data Protection Rules – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The EU Commission has been found liable for breaching the EU’s own data protection rules in a landmark ruling that could open...
Government Launches £1.9m Initiative to Boost UK’s Cyber Resilience – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK government has provided more details of a new scheme designed to help the nation better protect itself from cyber-threats. It...
Critical Ivanti Zero-Day Exploited in the Wild – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK’s National Cyber Security Centre (NCSC) and its US equivalent have urged Ivanti customers to take immediate action to mitigate two...
Green Bay Packers Pro Shop Data Breach Compromises Customers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The Green Bay Packers disclosed on Monday a data breach affecting their official online retail store, packersproshop.com, after discovering malicious code designed...
Darktrace to Acquire Incident Investigation Firm Cado Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Darktrace on Thursday announced the “proposed acquisition” of UK-based incident investigation and response firm Cado Security. Financial terms have not...
Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Florida-based medical and dental billing and revenue cycle management company Medusind has revealed that a data breach discovered in December...
GFI KerioControl Firewall Vulnerability Exploited in the Wild – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Threat actors are exploiting a recently disclosed GFI KerioControl firewall vulnerability that leads to one-click remote code execution (RCE), threat...
SonicWall Patches Authentication Bypass Vulnerabilities in Firewalls – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire SonicWall this week announced patches for multiple vulnerabilities in its firewalls, including two high-severity flaws that could lead to authentication...
The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press So much of the technology showcased at CES includes gadgets made to improve consumers’ lives — whether by leveraging AI...
From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon As we look ahead to the New Year and think about what we are going to prioritize from a security...
Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Palo Alto Networks on Wednesday announced patches for multiple vulnerabilities in the Expedition migration tool, including a high-severity bug leading...
Excelsior Orthopaedics Data Breach Impacts 357,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Excelsior Orthopaedics is notifying approximately 357,000 people that their personal and health information was compromised in a data breach resulting...
United Nations aviation agency hacked, recruitment database plundered – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The United Nations’ aviation agency has confirmed that hackers have compromised its systems, and accessed thousands of records stored in...
India Readies Overhauled National Data Privacy Rules – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Wavebreakmedia Ltd IFE-240405_3 via Alamy Stock Photo The government of India has drafted rules that will define...
Fed ‘Cyber Trust’ Label: Good Intentions That Fall Short – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Prisma by Dukas Presseagentur GmbH via Alamy Stock Photo Yesterday, the White House introduced a...
CrowdStrike Achieves FedRAMP Authorization for New Modules – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE AUSTIN, Texas – January 8, 2025 – CrowdStrike (Nasdaq: CRWD), today announced that the CrowdStrike Falcon® cybersecurity platform achieved Federal Risk and Authorization Management...
Trend Micro and Intel Innovate to Weed Out Covert Threats – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE DALLAS, Jan. 7, 2025 /PRNewswire/ — Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new collaboration with Intel® (NASDAQ: INTC) designed...
Zivver Report Reveals Critical Challenges in Email Security for 2025 – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE 7th January 2025 – Zivver, a leader in secure communications, has published its latest report, shedding light on critical gaps in email security practices...
Palindrome Technologies Approved as Cybersecurity Label Administrator for FCC’s IoT Program – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE PRINCETON, N.J., Jan. 6, 2025 /PRNewswire/ — Palindrome Technologies has been conditionally approved as a Cybersecurity Label Administrator (CLA) for the Federal...
Green Bay Packers’ Online Pro Shop Sacked by Payment Skimmer – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Source: Cal Sport Media via Alamy Stock Photo Fans of the Green Bay Packers football...