Overtaxed State CISOs Struggle With Budgeting, Staffing
CISOs for US states face the same kinds of challenges those at private companies do: lots of work to handle,…
Sloppy Entra ID Credentials Attract Hybrid Cloud Ransomware
Microsoft warns that ransomware group Storm-0501 has shifted from buying initial access to leveraging weak credentials to gain on-premises access…
Elaborate Deepfake Operation Takes a Meeting With US Senator
The threat actors managed to gain access to Sen. Ben Cardin (D-Md.) by posing as a Ukrainian official, before quickly…
THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 23-29)
Hold onto your hats, folks, because the cybersecurity world is anything but quiet! Last week, we dodged a bullet when…
Treat Your Enterprise Data Like a Digital Nomad
By combining agility with compliance, and security with accessibility, businesses will treat their data as a well-prepared traveler, ready for…
Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA
Attackers are increasingly turning to session hijacking to get around widespread MFA adoption. The data supports this, as: 147,000 token…
Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks
Critical security vulnerabilities have been disclosed in six different Automatic Tank Gauge (ATG) systems from five manufacturers that could expose…
Shadow AI, Sensitive Data Exposure & More Plague Workplace Chatbot Use
Productivity has a downside: A shocking number of employees share sensitive or proprietary data with the generational AI platforms they…