Insider Threat Damage Balloons as Visibility Gaps Widen
A growing number of organizations are taking longer to get back on their feet after an attack, and they’re paying…
iPhone ‘VoiceOver’ Feature Could Read Passwords Aloud
CVE-2024-44204 is one of two new Apple iOS security vulnerabilities that showcase an unexpected coming together of privacy snafus and…
U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown
Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored…
Cybersecurity Is Serious — but It Doesn’t Have to Be Boring
Thoughtfully applied, humor breaks through security fatigue, increases engagement, and fosters a culture of security awareness. Thoughtfully applied, humor breaks…
Criminals Are Testing Their Ransomware Campaigns in Africa
The booming economies of Africa, rich in natural resources and brimming with potential, are attracting not just investors, but also…
WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks
A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors…
Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors
Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps)…
How to Get Going with CTEM When You Don’t Know Where to Start
Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks…