Firefox Update Patches Exploited Vulnerability

Firefox Update Patches Exploited Vulnerability

Mozilla, the company behind the browser Firefox, issued a fix on Wednesday for a zero-day vulnerability they say has been exploited. NIST lists the vulnerability as CVE-2024-9680, and its status as “awaiting analysis.” Firefox users should update to the latest version of the browser and of the extended support releases to protect their systems from potential attacks. Due to widespread use of Firefox, this issue poses a significant risk, particularly for systems that haven’t been…

Read More

The Internet Archive Breach: Over 31 Million User Accounts Exposed

The Internet Archive Breach: Over 31 Million User Accounts Exposed

The Internet Archive, a non-profit digital library best known for its Wayback Machine, has disclosed a major data breach affecting over 31 million users as well as a series of distributed denial-of-service attacks. On the afternoon of Oct. 9, visitors of The Internet Archive started seeing pop-up messages that read: “Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just…

Read More

Only a Quarter of Cybersecurity Professionals are Women

Only a Quarter of Cybersecurity Professionals are Women

As of 2023, women make up only 20% and 25% of the cybersecurity workforce, according to training body ISC2. New research from Deloitte explores the reasons behind this gender gap, despite the high demand for skilled professionals in the industry. Half of young working women interested in cybersecurity feel they lack sufficient knowledge of the field to pursue a career in it. Furthermore, 55% of all women surveyed believe the industry could prove intimidating, and…

Read More

20% of Generative AI ‘Jailbreak’ Attacks are Successful

20% of Generative AI ‘Jailbreak’ Attacks are Successful

Generative AI jailbreak attacks, where models are instructed to ignore their safeguards, succeed 20% of the time, research has found. On average, adversaries need just 42 seconds and five interactions to break through. In some cases, attacks occur in as little as four seconds. These findings both highlight the significant vulnerabilities in current GenAI algorithms and the difficulty in preventing exploitations in real time. Of the successful attacks, 90% lead to sensitive data leaks, according…

Read More

Secure Organizations by Thinking Like a Hacker

Secure Organizations by Thinking Like a Hacker

“To catch a criminal, think like one.” In the rapidly evolving world of cybersecurity — where almost any average casual criminal can now leverage AI to launch attacks and hacking skills are for sale to the highest bidder on the dark web — network and security engineers need more than just technical expertise. They need to step into the shoes of a hacker. The best defense is a good offense, and understanding the tactics of…

Read More

Setting Up Your Network Security? Avoid These 4 Mistakes

Setting Up Your Network Security? Avoid These 4 Mistakes

Before you go and spend a ton of money on some “next-gen” network security solution, make sure you have the fundamentals locked down. Nearly one-third of businesses suffered a data breach in the last year, many of which were caused by common mistakes like: Weak passwords. Outdated software. Poor training. Excessive privileges. If you can avoid these mistakes, you make your organization a much less enticing target for hackers. In this post, we’ll walk through…

Read More

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Are Ghost Calls a Problem? Yes, if They Don’t Stop

A ghost call is an incoming call with no one on the other end when you answer it. Sometimes it’s an unrecognized number; other times the caller ID shows “Unknown.” Getting an occasional ghost call is common and nothing to worry about. But persistent ghost calls can be a major concern — particularly for businesses. Here’s why. Frequent ghost calls can tie up phone lines, preventing legitimate calls from reaching the company. This disruption can…

Read More

Make Cybersecurity Awareness Month a Game-Changer for You and Your Career

Make Cybersecurity Awareness Month a Game-Changer for You and Your Career

With cyber threats on the rise and the start of Cybersecurity Awareness Month, it couldn’t be a better time to elevate your skill set to meet attacks head-on—and defend, detect, and protect your data and networks. Here are some ways you can join us—one of the largest players in networking—on a mission to guard against cyber threats. Choose from our giveaway, training sale, new one-stop-shop resource hub, and a sample of our latest FREE cybersecurity…

Read More

5 Reasons Why Developers Should Attend Security Conferences

5 Reasons Why Developers Should Attend Security Conferences

On the first night of BlackHat USA, I made conversation with a few friendly penetration testers who were perplexed when I told them I was a developer. Why would I be at a cybersecurity conference? …What was I hoping to get out of it? My general (and perhaps vague) response to them, and to others I’d meet who would be perplexed by my attendance at both BlackHat and DefCon, was that I wanted a better…

Read More

Microsoft Reports on Progress of Revamping Security Efforts

Microsoft Reports on Progress of Revamping Security Efforts

On Sept. 23, Microsoft released a report detailing the progress of the Secure Future Initiative, the company-wide overhaul put in place in November 2023. The Secure Future Initiative exists to improve security in the wake of some high-profile vulnerabilities in 2023. These vulnerabilities included a breach in Microsoft Exchange Online that allowed threat actors associated with the Chinese government to access U.S. government emails in 2023. In April 2024, the U.S. Cyber Safety Review Board…

Read More
1 3 4 5 6 7 25