Fresh zero-day vulnerabilities continue to be actively exploited in the wild by attackers, often for surveillance and espionage purposes, according to the latest annual review of in-the-wild exploits published by Google. In 2023, 97 new zero-days came to light, up from 62 in 2022.
Palo Alto Networks Senior Vice President Anand Oswal details how Talon's browser technology secures unmanaged devices, enhances SASE capabilities and facilitates hybrid work. The platform security behemoth bought Tel Aviv, Israel-based based Talon in December for $458.6 million.
Proposed federal sticks and carrots to incentivize the health sector to implement stronger cybersecurity standards are already meeting opposition from some industry groups that say financial help is welcome but payment penalties for perceived laggards likely will do more harm than good.
The European Commission will scrutinize Meta's pivot to a subscription model in response to a string of rulings from data protection boards limiting the social media giant's ability to legally collect user data. Europe announced a slew of investigations into American big-tech companies.
The move to cloud has uncovered a range of risks that enterprises might inadvertently overlook. Transition often highlights cloud concentration risk, which encompasses vendor, availability, business continuity and regulatory risks, said Abid Adam, group chief risk and compliance officer at Axiata.
Iran-aligned threat actor TA450, also called MuddyWater, is using fake salary, compensation and financial incentive emails to trick Israeli employees at multinational organizations into clicking malicious links, according to researchers at security firm Proofpoint.
The integration of Oxeye into GitLab’s suite marks a significant leap in the accuracy and efficiency of security scans, directly addressing the challenge of false positives in static application security testing and enhancing software security across development stages, according to GitLab.
A nursing home operator is seeking bankruptcy protection, citing the effects of a ransomware attack last fall and fallout from the recent Change Healthcare outage as factors that contributed to its financial woes. Also, a Senate bill aims to address cash flows for some health firms hit by an attack.
Skyhigh Security snagged longtime Cloudera and Splunk executive Vishal Rao as its next CEO to capture more opportunities in the growing security service edge market. Rao replaces Gee Rittenhouse, who left the company Feb. 29 to become AWS' vice president for security services.
A new type of denial-of-service threat can disrupt an estimated 300,000 internet hosts that are at risk of exploitation. Researchers at the CISPA Helmholtz Center for Information Security say attackers are using IP spoofing to entangle two servers in a perpetual communication loop.
Revenue cycle management firm MedData has agreed to a $7 million settlement in a class action lawsuit filed after an employee inadvertently uploaded and exposed the health and personal information of about 136,000 individuals on the public-facing part of GitHub for more than a year.
Synopsys' board of directors signed off Wednesday on selling the company's $525 million application security testing business to focus exclusively on design automation and IP. The systems design behemoth began exploring strategic alternatives for its software integrity group in November.
OT cybersecurity threats loom larger and more complex than ever. With industrial control systems (ICS) powering consequential operations that provide for human life - electricity, oil and gas, water, and manufactured goods – there is a need for a pivotal shift from a reactive stance to proactive threat...
The House voted Wednesday to pass the Protecting Americans' Data from Foreign Adversaries Act, a bill that would provide the FCC with enhanced authorities to seek up to $50,000 in civil penalties against data brokers that sell Americans' sensitive information to countries such as Russia and China.
Major technology vendors keep being hacked by the nation-state hacking group Midnight Blizzard. Essential defenses to combat such attacks begin with implementing log monitoring across multiple platforms to find red flags, said John Fokker, head of threat intelligence at Trellix.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.