Please turn on your JavaScript for this page to function normally.
GenAI
CEOs accelerate GenAI adoption despite workforce resistance

CEOs are facing workforce, culture and governance challenges as they act quickly to implement and scale generative AI across their organizations, according to IBM. The annual …

identity risks
Technological complexity drives new wave of identity risks

Security leaders are facing increased technological and organizational complexity, which is creating a new wave of identity risks for their organizations, according to …

QNAP
15 QNAP NAS bugs and one PoC disclosed, update ASAP! (CVE-2024-27130)

Researchers have found 15 vulnerabilities in QNAP’s network attached storage (NAS) devices, and have released a proof-of-concept for one: an unauthenticated stack …

fluentbit
Critical Fluent Bit flaw affects major cloud platforms, tech companies’ offerings (CVE-2024-4323)

Tenable researchers have discovered a critical vulnerability (CVE-2024-4323) in Fluent Bit, a logging utility used by major cloud providers and tech companies, which may be …

Robert Haist
Strategies for combating AI-enhanced BEC attacks

In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is …

phishing
Phishing statistics that will make you think twice before clicking

This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape. AI-driven phishing attacks deceive even the most …

YouTube
YouTube has become a significant channel for cybercrime

Social engineering threats – those which rely on human manipulation – account for most cyberthreats faced by individuals in 2024, according to Avast. According to the latest …

ISC2 ebook cloud
eBook: 10 reasons why demand for cloud security is sky-high

Current demand for cloud security specialists far exceeds available talent. Especially for companies seeking protection in multicloud environments, professionals with …

Ivanti
PoC exploit for Ivanti EPMM privilege escalation flaw released (CVE 2024-22026)

Technical details about and a proof-of-concept (PoC) exploit for CVE-2024-22026, a privilege escalation bug affecting Ivanti EPMM, has been released by the …

SEC
SEC requires financial institutions to notify customers of breaches within 30 days

The Securities and Exchange Commission (SEC) announced the adoption of amendments to Regulation S-P to modernize and enhance the rules that govern the treatment of consumers’ …

AI
The challenges of GenAI in fintech

Due to the cybersecurity disclosure rules the Securities and Exchange Commission (SEC) has adopted in 2023, public entities in the US are required to disclose any material …

Grafana
Grafana: Open-source data visualization platform

Grafana is an open-source solution for querying, visualizing, alerting, and exploring metrics, logs, and traces regardless of where they are stored. Grafana provides tools to …

Don't miss

Cybersecurity news