Internet Security

How Can Major Cyber Breaches Like Transak’s Be Prevented in the Future?
Data Protection & Privacy How Can Major Cyber Breaches Like Transak’s Be Prevented in the Future?

The recent data breach at Miami-based cryptocurrency payment processor Transak exposed sensitive customer information of over 92,000 individuals due to a phishing attack on an employee’s laptop, revealing significant vulnerabilities in corporate security defenses. This incident, which compromised d

Are Industrial Process Sensors Secure Against Cyber Threats?
Infrastructure & Network Security Are Industrial Process Sensors Secure Against Cyber Threats?

In the realm of industrial operations, cybersecurity has become an increasingly critical focus, particularly within the Oil & Natural Gas industry. Process sensors, which play a vital role in monitoring and controlling industrial environments, are often overlooked in cybersecurity strategies.

Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent
Infrastructure & Network Security Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent

In recent developments, Styra has patched a crucial security flaw identified in its Open Policy Agent (OPA) that could have allowed remote attackers to compromise NTLM credentials. Discovered by cybersecurity researchers and designated CVE-2024-8260, this vulnerability necessitated immediate

SEC Fines Check Point, Mimecast, Unisys, Avaya for SolarWinds Hack Disclosures
Infrastructure & Network Security SEC Fines Check Point, Mimecast, Unisys, Avaya for SolarWinds Hack Disclosures

The US Securities and Exchange Commission (SEC) has taken enforcement actions against four companies for inadequate disclosures related to the SolarWinds hack. Check Point, Mimecast, Unisys, and Avaya are accused of failing to fully inform investors and the public about the impact of the hack,

How Does Falcon Foundry Simplify Custom Security App Development?
Infrastructure & Network Security How Does Falcon Foundry Simplify Custom Security App Development?

In today's rapidly evolving cybersecurity landscape, the ability to quickly and efficiently develop custom security applications is critical. CrowdStrike Falcon Foundry emerges as a pioneering solution, offering a low-code application platform that enables Security Operations Centers (SOCs) to

Cisco's Public DevHub Breach Highlights Growing Cybersecurity Risks
Data Protection & Privacy Cisco's Public DevHub Breach Highlights Growing Cybersecurity Risks

In a significant cybersecurity incident, the tech giant Cisco recently fell victim to a breach involving its public DevHub environment. The hacker known as IntelBroker claimed responsibility, purporting to have acquired sensitive data not just from Cisco, but also from other major corporations like

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later