Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws | TechRepublic

Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws | TechRepublic

The monthly report is relatively lightweight, with some mobile updates or fixes that have already been performed server-side and shouldn’t be a concern to admins, said Tyler Reguly, associate director of security R&D at global cybersecurity software and services provider Fortra. Another vulnerability impacts only Microsoft Surface hardware. February update patches two exploited vulnerabilities The two exploited vulnerabilities are: CVE-2025-21391, a Windows storage flaw that could let a threat actor delete files. CVE-2025-21418, an opening…

Read More

CHERI Security Hardware Program Essential to UK Security

CHERI Security Hardware Program Essential to UK Security

The UK government-backed Digital Security by Design (DSbD) initiative must succeed to systematically address rising cyber risks to the nation, according to the National Cyber Security Centre’s (NCSC) CTO, Ollie Whitehouse. Whitehouse made the remarks during an event showcasing the technological advances from the ambitious program, which aims to secure the underlying computer hardware used in the UK. Based on the hardware concepts of the Capability Hardware Enhanced RISC Instructions (CHERI) project, the program has…

Read More

Automation and a “back to basics” approach will shape cybersecurity

Automation and a “back to basics” approach will shape cybersecurity

Security teams are overwhelmed. That’s not an exaggeration — it’s just a statement of fact. Talk to security professionals at any organization, from small businesses to Fortune 500 companies, and you’ll hear the same story. SecOps and security engineering teams are stretched thin, with their attention divided across cloud, automation, AI, containers, scalable environments, and dozens of other “urgent” priorities. What’s more, the number of security controls in place has increased dramatically over the past…

Read More

Experience from GAP Assessment Audits for NIS2 Compliance

Experience from GAP Assessment Audits for NIS2 Compliance

The NIS2 (Directive (EU) 2022/2555 of the European Parliament and of the Council) imposes cybersecurity and information security compliance obligations on many organizations that previously had no such requirements. Most of these organizations, wishing to avoid financial penalties, aim to comply with the directive and the national implementing laws. To achieve compliance, they engage expert firms to ensure adherence. The first step towards compliance is to conduct an audit to identify any non-compliances. This article…

Read More

Romance Scams Cost Americans $697.3M Last Year

Romance Scams Cost Americans 7.3M Last Year

Nearly 59,000 Americans have fallen victim to romance scams in 2024, losing an estimated $697.3m. According to a new report from Comparitech, while reported cases dropped by 6% compared to 2023, the financial toll remains staggering. Romance scams, which often involve emotional manipulation, are now increasingly tied to cryptocurrency and investment fraud schemes, where victims are lured into transferring funds under the guise of love and financial opportunities. According to the report, Arizona had the highest rate…

Read More

Exclusive: Massive IoT Data Breach Exposes 2.7 Billion Records

Exclusive: Massive IoT Data Breach Exposes 2.7 Billion Records

A massive IoT data breach has exposed 2.7 billion records, compromising sensitive information such as Wi-Fi network names, passwords, IP addresses and device IDs.  Jeremiah Fowler, a cybersecurity researcher, reported the unprotected database linked to Mars Hydro, a China-based IoT grow light company, and LG-LED Solutions, a California-registered firm. Fowler disclosed the findings to vpnMentor, which shared them exclusively with Infosecurity. The database, comprising 1.17 terabytes of unprotected data, contained 13 folders with over 100 million…

Read More

Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)

Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)

Amid the rising pace of digitization, a growing number of organizations are managing their workloads based on a hybrid model. A hybrid model by design leads to dispersion of corporate data across different environments. Against this backdrop, it has become more difficult than ever to secure and protect the data from many digital identities that are used to access various systems. While security components like multifactor authentication (MFA), Single Sign-On (SSO), and Password Vaulting, among…

Read More

From data to decisions: Graham Construction's digital journey

From data to decisions: Graham Construction's digital journey

The importance of diversity in teams  As an immigrant, a woman, and a member of the LGBTQ community, I understand the value of diverse perspectives. Technology, like many industries, has historically been male-dominated. However, I am passionate about fostering diversity because it brings different viewpoints and approaches to problem-solving. Diverse teams are more innovative, and they produce better outcomes.  In the context of product development, diversity plays a critical role. By bringing together individuals from…

Read More

What Is GRC? Understanding Governance, Risk, and Compliance

What Is GRC? Understanding Governance, Risk, and Compliance

Governance, risk, and compliance, often called GRC, is a blanket term that describes the strategies and technologies used to manage an organization’s compliance with regulatory mandates and corporate governance standards. The concept of GRC can be traced back to 2003, but the topic was first extensively discussed in a peer-reviewed paper by Scott L. Mitchell, published in the International Journal of Disclosure and Governance in 2007. This guide discusses what GRC is and what it…

Read More

Security Detection Tech Failing, Say Cyber Leaders

Security Detection Tech Failing, Say Cyber Leaders

Almost three-quarters (74%) of IT security directors in regulated industries in the US and UK believe detection-based security technologies are outdated and inadequate. This surprising finding comes from Everfox’s latest CYBER360 report, a survey of 1000 IT and security leaders in government, defense and financial services across the US and UK. The report, published on February 12, 2025, lays bare the exceptionally high volume of cyber-attacks suffered by regulated organizations, with 97% of respondents saying…

Read More
1 47 48 49 50 51 2,651