21.2 C
Casper
Wednesday, September 18, 2024

TAG

Cyber Security

Swiss Air Force Documents Exposed on Darknet

The Swiss Air Force has been the victim of a malicious cyber-attack. The group allegedly responsible for the data breach is suspected to originate...

Mimecast Acquires Elevate Security to Address Human Risk

Company Plans to Enhance Digital Workplace Protection With Behavioral Analytics Mimecast announced the acquisition of human risk management solutions specialist Elevate Security as part of...

Ivanti Patches Critical Endpoint Security Vulnerability

SQL Injection Flaw Affects All Supported Versions of Ivanti Endpoint Manager Ivanti issued an urgent alert to users of its endpoint security product to patch...

Explained: Quishing (QR Phishing)

Quishing is a phishing attack that cleverly uses QR codes to trick users into visiting malicious websites. When a user scans a malicious QR code, their browser goes to the website indicated by the QR code.

Australian State Court Hit by Hackers: Recording Database Breached

Aussie justice in jeopardy! Hackers hit critical court databases, exposing sensitive data. An official said that hackers accessed the court recordings database in Australia's Victoria...

Breaking Down Walls: IT and Physical Security Unite to Fortify 2024

IT and physical security teams converge; demand for hybrid cloud solutions rises; access control modernization becomes a top priority, and data from IIoT devices...

Enterprise Telephony Systems Highly Vulnerable to Telecom Fraud

NextTech Today spoke with Arnd Baranowski, CEO at Oculeus, about how telecom fraud evolved, the type of voice communication services highly exposed to fraud,...

78% of CISOs Concerned About AppSec Manageability

An alarming 85% of CISOs acknowledge that development teams grapple with vulnerability noise and alert fatigue, hindering collaboration.

Securing Data and Defending Against Cyber Threats

Candid Wuest, VP of Cyber Protection Research at Acronis, highlights the critical importance of robust backup and disaster recovery strategies in safeguarding against cyber...

Latest news