Please turn on your JavaScript for this page to function normally.
Samsung Exynos
Samsung, Vivo, Google phones open to remote compromise without user interaction

Several vulnerabilities in Samsung’s Exynos chipsets may allow attackers to remotely compromise specific Samsung Galaxy, Vivo and Google Pixel mobile phones with no user …

Silicon Valley Bank
SVB account holders targeted with phishing, scams

After news broke late last week about Silicon Valley Bank’s bank run and collapse, security researchers started warning SVB account holders about incoming SVB-related …

New infosec products of the week: March 17, 2023
New infosec products of the week: March 17, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Atakama, Elevate Security, Hornetsecurity, HYPR, and ReversingLabs. Hornetsecurity …

ChatGPT
How ChatGPT is changing the cybersecurity game

The cybersecurity industry can leverage GPT-3 potential as a co-pilot to help defeat attackers, according to Sophos. The latest report details projects developed by Sophos …

AI
Most security pros turn to unauthorized AI tools at work

Security experts are increasingly resorting to unauthorized AI tools, possibly because they are unhappy with the level of automation implemented in their organization’s …

traffic
Tracking the global spread of malware

Approximately 10-16 percent of organizations have shown evidence of malicious command and control (C2) activities, strongly indicating a network breach within the last year, …

Amazon Linux 2023
Amazon Linux 2023: Create and execute cloud-based applications with enhanced security

AWS has been offering Amazon Linux, a cloud-optimized Linux distribution, since 2010. This distribution’s latest version is now available. Amazon Linux 2023 is provided …

identity theft
Cyber attribution: Vigilance or distraction?

Cyber attribution is a process by which security analysts collect evidence, build timelines and attempt to piece together evidence in the wake of a cyberattack to identify the …

identity
Navigating the future of digital identity

1,450 global consumers’ experiences with passwordless authentication, hybrid identities, and ownership over personally identifiable information reveal that they want …

cloud complexity
Rushed cloud migrations result in escalating technical debt

While 93% of CIOs expect an increase in IT budgets for 2023, 83% of them are feeling pressured to stretch their budgets even further than before, with a focus on managing …

patch
Virtual patching: Cut time to patch from 250 days to <1 day

Unpatched vulnerabilities are responsible for 60% of all data breaches. The Department of Homeland Security has estimated that the proportion of breaches stemming from …

Mirel Sehic
How Mirel Sehic relies on simplicity to focus on product security

If you are developing a modern medical, manufacturing, or logistics facility, there’s no doubt that a large portion of your investment was made into the electronic aspects of …

Don't miss

Cybersecurity news