By Matthew T. Carr Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. Related: Deploying human sensors This results from emulating the...
FIRESIDE CHAT: U.S. banking regulators call out APIs as embodying an attack surface full of risk
By Byron V. Acohido APIs have been a linchpin as far as accelerating digital transformation — but they’ve also exponentially expanded the attack surface of modern...
GUEST ESSAY: Here’s why a big cybersecurity budget won’t necessarily keep your company safe
By Zac Amos The cybersecurity landscape is constantly changing. While it might seem like throwing more money into the IT fund or paying to hire cybersecurity...
GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation
By Collin McNulty One common misconception is that scammers usually possess a strong command of computer science and IT knowledge. Related: How Google, Facebook enable snooping...
SHARED INTEL Q&A: Bi-partisan report calls for a self-sacrificing approach to cybersecurity
By Byron V. Acohido A new report from the Bipartisan Policy Center (BPC) lays out — in stark terms – the prominent cybersecurity risks of the...
GUEST ESSAY: Could CISOs be on the verge of disproving the ‘security-as-a-cost-center’ fallacy?
By Jess Burn This year has kicked off with a string of high-profile layoffs — particularly in high tech — prompting organizations across all sectors to...
GUEST ESSAY: Five stages to attain API security — and mitigate attack surface exposures
By Rakshith Rao APIs (Application Programming Interfaces) play a critical role in digital transformation by enabling communication and data exchange between different systems and applications. Related:...
GUEST ESSAY: Why CISOs absolutely must take authentication secrets much more seriously
The IT world relies on digital authentication credentials, such as API keys, certificates, and tokens, to securely connect applications, services, and infrastructures. Related: The coming of...
GUEST ESSAY: Testing principles to mitigate real-world risks to ‘SASE’ and ‘Zero Trust’ systems
By Sashi Jeyaretnam A new generation of security frameworks are gaining traction that are much better aligned to today’s cloud-centric, work-from-anywhere world. Related: The importance of...
Cyberwarfare leaks show Russian army is adopting mindset of secret police
A consortium of media outlets have published a bombshell investigation about Russia’s cyber-capabilities, based on a rare leak of documents. The files come from NTC Vulkan,...
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
The inconspicuous office is in Moscow’s north-eastern suburbs. A sign reads: “Business centre”. Nearby are modern residential blocks and a rambling old cemetery, home to ivy-covered...
TechScape: How the world is turning against social media
Government workers in the UK, US, Canada and European Union (the list will have grown by the time you read this) are banned from installing TikTok...
Yes, it’s crazy to have TikTok on official phones. But it’s not good for any of us | John Naughton
As of this moment, government officials in 11 countries are forbidden to run TikTok on their government-issued phones. The countries include the US, Canada, Denmark, Belgium,...
TikTok banned on London City Hall devices over security concerns
London City Hall staff will no longer have TikTok on their devices in the latest ban imposed on the Chinese-owned social media app over security concerns....
TikTok to be banned from UK parliamentary devices
Parliament is to ban the Chinese-owned video-sharing app TikTok from “all parliamentary devices and the wider parliamentary network”, citing the need for cybersecurity. The move goes...
BBC urges staff to delete TikTok from company mobile phones
The BBC has urged its staff to delete the Chinese-own social media app TikTok from corporate mobile phones. Guidance to BBC staff circulated on Sunday said:...
Why is TikTok banned from government phones – and should the rest of us be worried?
TikTok is wildly popular, with more than 1 billion people consuming its short video posts around the world. But the app is less favoured by politicians...
The TikTok wars – why the US and China are feuding over the app
TikTok is once again fending off claims that its Chinese parent company, ByteDance, would share user data from its popular video-sharing app with the Chinese government,...
MPs and peers ask information commissioner to investigate TikTok
A cross-party group of MPs and peers have asked the information commissioner to investigate whether the Chinese-owned TikTok’s handling of personal information is in breach of...
The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say
The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area of risk...
The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say
The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area of risk...
The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say
The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area of risk...
New Money Message ransomware demands million dollar ransoms
A new ransomware gang named ‘Money Message’ has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak data and release a decryptor. The new...
Fake ransomware gang targets U.S. orgs with empty data leak threats
Fake extortionists are piggybacking on data breaches and ransomware incidents, threatening U.S. companies with publishing or selling allegedly stolen data unless they get paid. Sometimes the...
DISH slapped with multiple lawsuits after ransomware cyber attack
Dish Network has been slapped with multiple class action lawsuits after it suffered a ransomware incident that was behind the company’s multi-day “network outage.” These class action lawsuits,...
Twitter open-sources recommendation algorithm code
Twitter announced on Friday that it’s open-sourcing the code behind the recommendation algorithm the platform uses to select the contents of the users’ For You timeline....
15 million public-facing services vulnerable to CISA KEV flaws
Over 15 million publicly facing services are susceptible to at least one of the 896 vulnerabilities listed in CISA’s KEV (known exploitable vulnerabilities) catalog. This massive...
Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs
Hackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by over eleven million websites. Elementor Pro is a WordPress page...
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
A 10-year-old Windows vulnerability is still being exploited in attacks to make it appear that executables are legitimately signed, with the fix from Microsoft still “opt-in”...
Consumer lender TMX discloses data breach impacting 4.8 million people
TMX Finance and its subsidiaries TitleMax, TitleBucks, and InstaLoan have collectively disclosed a data breach that exposed the personal data of 4,822,580 customers. TitleMax is a...


























