Internet Security

ENGlobal Faces Ransomware Attack, Limits IT Access for Investigation
Malware & Threats ENGlobal Faces Ransomware Attack, Limits IT Access for Investigation

In an alarming turn of events, ENGlobal, a Texas-based engineering and automation contractor for the energy sector, encountered a ransomware attack on November 25, 2024, significantly disrupting its operations. The attacker managed to encrypt the company's data files, prompting rapid action

Can Corrupted MS Office Files Really Bypass Your Email Security?
Infrastructure & Network Security Can Corrupted MS Office Files Really Bypass Your Email Security?

Phishers have now devised an innovative and troubling method to bypass email security, utilizing corrupted Microsoft Office files that exploit the predictable behaviors of software recovery processes. This new tactic targets users with enticing messages about payments, benefits, or year-end bonuses

Veracode Enhances Secure Software Development with AI and Risk Management
Infrastructure & Network Security Veracode Enhances Secure Software Development with AI and Risk Management

Veracode is pioneering advancements in secure software development, aiming to assist developers in crafting secure-by-design software and enabling security teams to mitigate risks throughout their code-to-cloud ecosystem. This analysis will delve into the latest enhancements Veracode has

Radiant Logic Unveils Identity Observability for Enhanced Security
Identity & Access Management Radiant Logic Unveils Identity Observability for Enhanced Security

In a significant development for organizations grappling with identity sprawl and outdated architecture, Radiant Logic has announced a cutting-edge enhancement to its RadiantOne Central Intelligence Hub. This enhancement introduces Identity Observability, a feature designed to deliver comprehensive

Navigating the Perils of Data Management: A CISO's Growing Challenge
Data Protection & Privacy Navigating the Perils of Data Management: A CISO's Growing Challenge

The rapid growth of data has led to significant challenges within enterprises, particularly for Chief Information Security Officers (CISOs), who are increasingly concerned about the vast amounts of information they are tasked with managing. Reflecting on a time when data storage was minimal, it is

BrazenBamboo Exploits Fortinet VPN Flaw with Advanced Modular Malware
Infrastructure & Network Security BrazenBamboo Exploits Fortinet VPN Flaw with Advanced Modular Malware

A Chinese government-linked group known as "BrazenBamboo" has recently come under scrutiny for exploiting a zero-day vulnerability in Fortinet's Windows VPN client. The vulnerability, which was discovered and reported by Volexity in mid-July, has remained unpatched, allowing

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later