Browsing Category
Cybersecurity
Surge in CVEs as Microsoft Fixes Exploited Zero Day Bugs
Microsoft addressed 121 vulnerabilities in the August 2022 Patch Tuesday update round, including two zero-day bugs.
One of the…
The OT Security Conundrum: Vulnerabilities, Skill Gaps, and Operational…
Securing OT Environments from Cyber Threats
By Jim Montgomery, Principal Solutions Architect with TXOne Networks
Securing…
New Malicious Python Libraries Found on PyPI Repository
Security researchers from Check Point have spotted 10 malicious packages on Python Package Index (PyPI), the primary Python…
US Treasury Sanctions Virtual Currency Mixer For Connections With Lazarus…
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) said on Monday it issued sanctions against virtual…
Report Provides Updates on July’s Maui Ransomware Incident
Cybersecurity researchers from Kaspersky have published a new advisory providing additional technical details and attribution…
Zero Trust Architecture: Adoption, Benefits, and Best Practices
What is Zero Trust security, and what are the benefits? Here’s how to prevent data breaches by staying on top of security…
Health Adviser Fined After Illegally Accessing Medical Records
A former healthcare worker has been found guilty of accessing the medical records of people known to him without a legitimate…
Smishing Attack Led to Major Twilio Breach
Communications API developer Twilio has revealed a data breach last week in which an undisclosed number of customer accounts were…
Number of Firms Unable to Access Cyber-Insurance Set to Double
A “perfect storm” of surging threats, economic headwinds and evolving regulations will see many organizations miss out on…
Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in…
Meta said it took action against two cyber espionage operations in South Asia: Bitter APT and APT36, respectively.
The company…