CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

More than half of open-source projects contain code written in a memory-unsafe language, a report from the U.S.’s Cybersecurity and Infrastructure Security Agency has found. Memory-unsafe means the code allows for operations that can corrupt memory, leading to vulnerabilities like buffer overflows, use-after-free and memory leaks. The report’s results, published jointly with the FBI, Australian Signals Directorate’s Australian Cyber Security Centre, and Canadian Cyber Security Center, are based on analysis of 172 critical projects defined…

Read More

AI Is Changing the Way Enterprises Look at Trust: Deloitte & SAP Weigh In

AI Is Changing the Way Enterprises Look at Trust: Deloitte & SAP Weigh In

Whether you are creating or customizing an AI policy or reassessing how your company approaches trust, keeping customers’ confidence can be increasingly difficult with generative AI’s unpredictability in the picture. We spoke to Deloitte’s Michael Bondar, principal and enterprise trust leader, and Shardul Vikram, chief technology officer and head of data and AI at SAP Industries and CX, about how enterprises can maintain trust in the age of AI. Organizations benefit from trust First, Bondar…

Read More

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware is arguably the most high-profile security threat of the moment. Cybercriminals across the world are demanding money from victims by holding their devices and data hostage. This type of attack, in which data is encrypted or claimed to be and victims are prompted to pay for the key to restore access, has been growing rapidly since 2013 and is now one of the most common types of malware. TechRepublic’s cheat sheet about ransomware is…

Read More

What Security Means to Families | McAfee Blog

What Security Means to Families | McAfee Blog

What is our real job as parents? Is it to ensure our kids get good grades? – Maybe. Or is it ensuring we can give them the latest and greatest clothing and devices? Mmmm, not really. When all is said and done, I believe our real job is to keep our kids safe, teach them to be independent, and set them up for success – both online and offline. As first-generation digital parents, many of…

Read More

How to Spot a Business Email Compromise Scam

How to Spot a Business Email Compromise Scam

So this is the first step: Take control of your emotions. Yes, it can be difficult if you work in a demanding field. But it’s your best first defense, and your employer will thank you for it (or, at least, they should). Always Confirm Through a Second Channel Now that you’re skeptically questioning the legitimacy of the urgent request, check to make sure the email is coming from the person it claims to be from….

Read More

Apple iOS 18 Cheat Sheet: Release Date, RCS Integration and More

Apple iOS 18 Cheat Sheet: Release Date, RCS Integration and More

Apple’s latest version of its mobile operating system, iOS 18, was unveiled during WWDC ‘24 on June 10, 2024, and features many niceties that users have been wanting for years. From AI integration with Siri and throughout the system to a standalone Passwords app, to being able to send messages via satellite when your iPhone doesn’t have service, there’s a feature that will likely appeal to someone. Whether you’re using an iPhone or an iPad,…

Read More

Revelations from Cisco Live: The Future of AI and Integrated Security

Revelations from Cisco Live: The Future of AI and Integrated Security

I look forward to Cisco Live every year, and last week’s event in Las Vegas did not disappoint. This year, integrated security and AI took center stage.  This is not surprising as it represents some of the largest growth opportunities over the next 24 months and what is top of mind for many of our customers. But the level of innovation and excitement around the opportunities that Cisco + Splunk will unlock to optimize your…

Read More

Transforming Security: Latest Innovations Driving Partner Growth

Transforming Security: Latest Innovations Driving Partner Growth

Cisco Security was one of the four G.O.A.T.s at Cisco Live US 2024! I’m here to give our #CiscoPartners a recap on our Cisco Security announcements. Read on to hear about all the security innovation, what it means for partners, and what’s ahead together. Catch up on Cisco Live We’ve been on a roll with rapid innovation across the Cisco Security Cloud. Building on that momentum at Cisco Live, we shared a few big product…

Read More

Olympics 2024: Cyber Attackers are Targeting Companies Associated With Paris Games

Olympics 2024: Cyber Attackers are Targeting Companies Associated With Paris Games

Organisations linked to the Paris Olympics 2024 have an increased risk of cyber attacks, including ransomware, credential leaks and phishing campaigns, a study has found. Insikt Group, the threat research division of security firm Recorded Future, has already observed posts advertising access to Games-related organisations in France and compromised credentials using “paris2024[dot]org” domains on the Dark Web. These findings were published in a new report highlighting high-priority threats to the Games, based on an assessment…

Read More

International Malware Takedown Seized 100+ Servers

International Malware Takedown Seized 100+ Servers

An international coalition of police organized by the European Union’s justice and police agencies has revealed an ongoing operation against malware droppers that Europol calls the “largest ever operation” of its kind. Called “Operation Endgame,” the ongoing initiative targets malware delivery “droppers” and “loaders,” and is an attempt to disrupt large-scale malware deployments. Between May 27 and May 29, police arrested four people, seized more than 100 servers and took control of more than 2,000…

Read More
1 5 6 7 8 9 15