How to talk to board members about cyber – NCSC Blog
New guidance helps CISOs communicate with Boards to improve oversight of cyber risk. – Read More
New guidance helps CISOs communicate with Boards to improve oversight of cyber risk. – Read More
Mastering the art of risk storytelling is essential for CISOs not just for engagement, but for driving meaningful action across the organization. The right story should emphasize cybersecurity risks with…
Security researchers warn that a malware campaign dubbed perfctl has infected millions of Linux servers over the past three to four years by attempting to exploit around 20,000 misconfigurations that…
Security researchers warn that a malware campaign dubbed perfctl has targeted millions of Linux servers over the past three to four years by attempting to exploit around 20,000 misconfigurations that…
Europe’s top court has ruled that Meta Platforms must restrict the use of personal data harvested from Facebook for serving targeted ads even when users consent to their information being…
Apple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user’s passwords to be read out aloud by its VoiceOver assistive…
The collaboration with industry partners will improve collective AI defenses. Trusted contributors receive protected and anonymized data on real-world AI incidents. – Read More
Google’s Manifest V3 offers better privacy and security controls for browser extensions than the previous M2, but too many lax permissions and gaps remain. – Read More
CVE-2024-44204 is one of two new Apple iOS security vulnerabilities that showcase an unexpected coming together of privacy snafus and accessibility features. – Read More
A growing number of organizations are taking longer to get back on their feet after an attack, and they’re paying high price tags to do so — up to $2M…
The successful disruption of notorious Russian hacker group Star Blizzard’s operations arrives one month out from the US presidential election — one of the APT’s prime targets. – Read More
Thoughtfully applied, humor breaks through security fatigue, increases engagement, and fosters a culture of security awareness. – Read More
Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties to Russia to facilitate computer fraud…
The booming economies of Africa, rich in natural resources and brimming with potential, are attracting not just investors, but also cybercriminals. Here’s why. – Read More
Distinct groups of cybercriminals have been exploiting the CosmicSting flaw in Adobe’s Commerce and Magento software to steal customers’ payment information. According to research by Sansec, miscreants have used the…