Apple fixes actively exploited iOS, macOS zero-day (CVE-2022-22620)
Another month, another zero-day (CVE-2022-22620) exploited in the wild that has been fixed by Apple. About CVE-2022-22620 CVE-2022-22620 is a use after free issue in WebKit, …
Log4j exploitation risk is not as high as first thought, cyber MGA says
When the Log4Shell vulnerability (CVE-2021-44228) was publicly revealed in December 2021, CISA Director Jen Easterly said that it is the “most serious” vulnerability she has …
New infosec products of the week: February 11, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Cofense, Cybellum, DataStax, Federal Reserve, Gigamon, Qualys, Runecast, and Spin …
Cloud security training is pivotal as demand for cloud services explode
Change is afoot. The private, public and third sector are transitioning from on-premises and datacenter-hosted infrastructure to hybrid architectures utilizing …
The most common cyber gaps threatening supply chain security
Panorays has identified the top five most common cyber gaps among third-party organizations over 2021. Analyzing data gathered from cyber posture evaluations of tens of …
How to prepare your organization for this year’s cybersecurity incidents
Sotero has shared its top five predictions for data security and privacy in 2022. Cybersecurity incidents have risen 125% year over year and will continue to grow …
AI can spot biometric spoofing attacks with ease
Humans have far greater difficulty identifying images of biometric spoofing attacks compared to computers performing the same task, according to research released by ID …
Execs concerned about failing to deliver working arrangements that meet employee expectations
Executives are concerned about their ability to deliver value propositions that satisfy employees and a subsequent inability to retain and recruit talent, according to …
Organizations and the cloud: How they use it and how they secure it
The Cloud Security Alliance (CSA) released the findings of its latest survey which offers insight into companies’ plans regarding cloud and security strategy, cloud services, …
Digital identity revenue to exceed $53B in 2026
A study from Juniper Research has found that revenue for digital identity vendors will exceed $53 billion globally in 2026, doubling from $26 billion in 2021. Digital identity …
Tips to mitigate public-key cryptography risk in a quantum computing world
Quantum computing is poised to transform the industry over the next decade. With its promise of breakthrough speed and power, it’s easy to understand why there is so much hype …
Low code applications are essential for cybersecurity development in applications
One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader