Dustin Webber named Chief Security Officer at NetAbstraction

Dustin Webber named Chief Security Officer at NetAbstraction

Dustin Webber named Chief Security Officer at NetAbstraction | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Not just another threat report!

Not just another threat report!

Not just another threat report! | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

1 in 4 employees who fell victim to cyberattacks lost their jobs

1 in 4 employees who fell victim to cyberattacks lost their jobs

1 in 4 employees who fell victim to cyberattacks lost their jobs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

New Backdoor Targets French Entities via Open-Source Package Installer

New Backdoor Targets French Entities via Open-Source Package Installer

Researchers have exposed a new targeted email campaign aimed at French entities in the construction, real estate, and government sectors that leverages the Chocolatey Windows package manager to deliver a backdoor called Serpent on compromised systems. Enterprise security firm Proofpoint attributed the attacks to a likely advanced threat actor based on the tactics and the victimology patterns observed. The ultimate objective of the campaign remains presently unknown. “The threat actor attempted to install a backdoor…

Read More

Sailaja Kotra-Turner appointed CISO at Brown-Forman

Sailaja Kotra-Turner appointed CISO at Brown-Forman

Sailaja Kotra-Turner appointed CISO at Brown-Forman | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Four security protocols to protect the new normal, a hybrid steady state

Four security protocols to protect the new normal, a hybrid steady state

Four security protocols to protect the new normal, a hybrid steady state | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Listen to Josh Yavor, Tessian CISO, talk burnout among security teams and executives

Listen to Josh Yavor, Tessian CISO, talk burnout among security teams and executives

Listen to Josh Yavor, Tessian CISO, talk burnout among security teams and executives | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

A deep dive into China APT41’s breach of six U.S. state governments

A deep dive into China APT41’s breach of six U.S. state governments

A deep dive into China APT41’s breach of six U.S. state governments | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Samsung confirms data breach affecting source code

Samsung confirms data breach affecting source code

Samsung confirms data breach affecting source code | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

A transformative journey

A transformative journey

A transformative journey | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message…

Read More
1 11 12 13 14 15 35