Spyware vendors use a combination of zero-day exploits and known vulnerabilities. Google TAG researchers urge faster patching of mobile devices Several commercial spyware vendors developed and...
Category: The Hacker News
Italian privacy regulator bans ChatGPT over collection, storage of personal data
Italy’s privacy Guarantor bans ChatGPT with immediate effect as it investigates its data privacy procedures. Italy’s data privacy regulator has banned ChatGPT over alleged privacy violations...
New CISO appointments, February 2023
Keep up with news of CSO, CISO, and other senior security executive appointments. Rawpixel / Getty Images The upper ranks of corporate security are seeing a...
Kyndryl lays off staff in search of efficiency
The layoffs are part of a restructuring initiative aimed at improving efficiency and customer service, Kyndryl says. Kyndryl Kyndryl, the managed IT services provider that spun...
APT group Winter Vivern exploits Zimbra webmail flaw to target government entities
Winter Vivern’s campaign shows that threat actors can effectively take advantage of medium-severity vulnerabilities. An APT group known in the security industry as Winter Vivern has...
3CX DesktopApp compromised by supply chain attack
3CX will be releasing an update for the DesktopApp in the next few hours; meanwhile, users are urged to use the PWA Client instead. WhataWin /...
DXC Technology says global network is not compromised following Latitude Financial breach
By Samira Sarraf Regional Editor for Australia and New Zealand, CSO | enjoynz / Getty Images Soon after Latitude Financial revealed it suffered a cyber attack,...
BrandPost: R.I.P. passwords. Hello peace of mind
About | An evolving threat landscape, expanding attack surface and accelerated digital transformation require organizations to take modern approaches to improving security and enhancing user experience....
BrandPost: The importance of low code/no code workflow orchestration in digital transformation
About | An evolving threat landscape, expanding attack surface and accelerated digital transformation require organizations to take modern approaches to improving security and enhancing user experience....
BrandPost: Should physical proximity be a required MFA factor?
About | An evolving threat landscape, expanding attack surface and accelerated digital transformation require organizations to take modern approaches to improving security and enhancing user experience....
North Korean threat actor APT43 pivots back to strategic cyberespionage
The APT43 group is highly adept at using social engineering to target individuals and extract sensitive information. When it comes to threat actors working for the...
Noname Security releases API security updates
The latest API security upgrades from Noname focus on expanded testing and discovery. Photon photo API security vendor Noname Security today announced a new release of...