The Week in Cyber Security and Data Privacy: 8 – 14 January 2024
Welcome to this week’s round-up of the biggest and most interesting news stories. At the end of each month, these…
Welcome to this week’s round-up of the biggest and most interesting news stories. At the end of each month, these…
Over at Wired, Andy Greenberg has an excellent story about the creators of the 2016 Mirai botnet.
Experts warn that recently disclosed Ivanti Connect Secure VPN and Policy Secure vulnerabilities are massively exploited in the wild. Last…
Researchers warn of high-severity vulnerability affecting Bosch BCC100 thermostats. Researchers from Bitdefender discovered a high-severity vulnerability affecting Bosch BCC100 thermostats.…
By Rupal Hollenbeck, President, Check Point With cyber attacks rising and trust in institutions declining, having a cyber security resilience…
By Anurag Lal, President and CEO of NetSfere Using personal messaging apps for business communication and collaboration is harmless –…
Researchers from Bishop Fox found over 178,000 SonicWall next-generation firewalls (NGFW) publicly exploitable. SonicWall next-generation firewall (NGFW) series 6 and…
Presently sponsored by: Kolide ensures that if a device isn’t secure, it can’t access your apps. It’s Device Trust for…
Threat actors exploit a recent Windows SmartScreen bypass flaw CVE-2023-36025 to deliver the Phemedrone info stealer. Trend Micro researchers uncovered…
New research demonstrates voice cloning, in multiple languages, using samples ranging from one to twelve seconds. Research paper.