Cybersecurity leaders reflect on Samsung, ChatGPT incidents

Cybersecurity leaders reflect on Samsung, ChatGPT incidents

Cybersecurity leaders reflect on Samsung, ChatGPT incidents | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability

Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability

Mar 31, 2023Ravie LakshmananCyber Espionage / APT The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in Europe and the U.S. as part of an ongoing cyber espionage campaign. “TA473 since at least February 2023 has continuously leveraged an unpatched Zimbra vulnerability in publicly facing webmail portals that allows them to gain access to the email mailboxes of government entities in Europe,” Proofpoint said in a new report. The enterprise…

Read More

5 minutes with Bob Burke – The importance of advanced MFA technology

5 minutes with Bob Burke – The importance of advanced MFA technology

5 minutes with Bob Burke – The importance of advanced MFA technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Will AI make organizations more secure?

Will AI make organizations more secure?

Will AI make organizations more secure? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

How CISOs and CFOs can collaborate to combat cyber threats

How CISOs and CFOs can collaborate to combat cyber threats

How CISOs and CFOs can collaborate to combat cyber threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Unauthorized network access most common cause of third-party attacks

Unauthorized network access most common cause of third-party attacks

Unauthorized network access most common cause of third-party attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering Malware

Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering Malware

Feb 03, 2023Ravie LakshmananAttack Vector / Endpoint Security In a continuing sign that threat actors are adapting well to a post-macro world, it has emerged that the use of Microsoft OneNote documents to deliver malware via phishing attacks is on the rise. Some of the notable malware families that are being distributed using this method include AsyncRAT, RedLine Stealer, Agent Tesla, DOUBLEBACK, Quasar RAT, XWorm, Qakbot, BATLOADER, and FormBook. Enterprise security firm Proofpoint said it…

Read More

Over half of organizations experienced an insider threat in 2022

Over half of organizations experienced an insider threat in 2022

Over half of organizations experienced an insider threat in 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

AI-based security solutions can detect & prevent fraudulent activity

AI-based security solutions can detect & prevent fraudulent activity

AI-based security solutions can detect & prevent fraudulent activity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

3 healthcare data vulnerabilities to be mindful of in 2023

3 healthcare data vulnerabilities to be mindful of in 2023

3 healthcare data vulnerabilities to be mindful of in 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 5 6 7 8 9 25