Monthly Archives: January 2025
Five ways to make cybersecurity resilience more than just a buzzword
COMMENTARY: The word resilience gets tossed around a lot in cybersecurity, but what does it really mean?In a cybersecurity context, res...
Finnish court rejects calls to release tanker suspected of subsea cable damage
News
The tanker is believed to have damage submarine telecoms and electricity cables by dragging its anchor across the lines late last ...
Microsoft pushes identity management feature for Azure via Entra
Microsoft released a new Azure feature aimed at minimizing security risk during authentication.The Federated Identity Credentials syste...
New LLM jailbreak uses models’ evaluation skills against them
A new jailbreak method for large language models (LLMs) takes advantage of models’ ability to identify and score harmful content in ord...
FireScam Android malware poses as Telegram app to steal sensitive data
An Android infostealer malware called FireScam disguised as a fake Telegram Premium app was discovered being distributed through a GitH...
Identity-security predictions for 2025 | SC Media
What's in store for 2025? No one knows for sure, but experts at Okta have made some educated guesses, especially as they relate to the ...
Endpoint Security – Rob Allen – SWN Vault
Rob Allen is an IT Professional with almost two decades of experience assisting small and medium enterprises embrace and utilize techno...
US court blocks reinstatement of net neutrality
News
The court of appeal ruled on Thursday that the Federal Communications Commission (FCC) does not have the legal authority to reinst...
Treasury’s sanctions office reportedly subjected to Chinese hack
Chinese state-sponsored threat operation Volt Typhoon, also known as Vanguard Panda, was regarded by CrowdStrike Senior Vice President ...
Network sniffing attacks threaten millions of unencrypted mail servers
"This means that passwords used for mail access may be intercepted by a network sniffer. Additionally, service exposure may enable pass...