News & Updates

Join This Webinar — Zero Trust + Deception: Learn How to Outsmart Attackers!

Cybersecurity is constantly evolving, but complexity can give hostile actors an advantage. To stay ahead of current and future attacks, it’s essential to simplify and reframe your defenses. Zscaler Deception is a state-of-the-art next-generation deception technology seamlessly integrated with the Zscaler Zero Trust Exchange. It creates a hostile environment for attackers and enables you to track
News & Updates

How Addictive Tech Hacks Your Brain

Here’s a situation most of us can relate to: We find ourselves facing a dull moment—maybe standing in a checkout line, sitting in a waiting room, or even stuck at a red light—and our hands suddenly feel empty. Like they have a mind of their own, they reach for our pockets, and place a screen in front of our faces.…

Read more…

News & Updates

Critical fixed critical flaws in Cisco Small Business Switches

Cisco fixed nine flaws in its Small Business Series Switches that could be exploited to execute arbitrary code or cause a DoS condition. Cisco has released security updates to address nine security vulnerabilities in the web-based user interface of certain Small Business Series Switches that could be exploited by an unauthenticated, remote attacker to execute […]

The post Critical fixed critical flaws in Cisco Small Business Switches appeared first on Security Affairs.

News & Updates

How to Reduce Exposure on the Manufacturing Attack Surface

Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the factory floor has accelerated the connection of machinery to digital systems and data. Computer systems for managing and monitoring digital systems and data have been added to the hardware and software used for
Cybersecurity Tools

Five Years of the EU General Data Protection Regulation and Data Protection Act 2018

For many outside the data privacy and IT governance, risk management and compliance sectors, the GDPR (General Data Protection Regulation) seemed to appear five years ago as if from nowhere. It had barely made the news before May 2018, but in the weeks running up to its effective date of 25 May 2018 it gained the sort of media coverage and popular interest that most aspirant celebrities can only yearn for. (Indeed, the European Commission proudly shared in a since-deleted infographic that ‘GDPR’ was googled more often than Beyoncé or Kim Kardashian.) The Regulation’s time in the media spotlight didn’t

The post Five Years of the EU General Data Protection Regulation and Data Protection Act 2018 appeared first on IT Governance UK Blog.

News & Updates

Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks

The rising geopolitical tensions between China and Taiwan in recent months have sparked a noticeable uptick in cyber attacks on the East Asian island country.
“From malicious emails and URLs to malware, the strain between China’s claim of Taiwan as part of its territory and Taiwan’s maintained independence has evolved into a worrying surge in attacks,” the Trellix Advanced Research Center said 
News & Updates

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency

The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in Oracle WebLogic servers to ensnare vulnerable instances into a botnet and distribute cryptocurrency mining malware.
The flaw in question is CVE-2017-3506 (CVSS score: 7.4), which, when successfully exploited, could allow an unauthenticated attacker to execute arbitrary commands
Scroll to Top