Posts by admin
IT pros say hackers could compromise device supply chain, firmware security
An opportunity is emerging for hackers to compromise firmware within the supply chain, according to HP Wolf Security, which said that i...
Ransomware impacts Ohio county’s emergency services
While Wood County's fire and emergency services have been unaffected by the incident, the compromise of the county's record management ...
Almost 30K Sabre employees’ data compromised in ransomware attack
Data exposed by the incident included employees' names, birthdates, Social Security numbers, employment details, financial account numb...
Report: Cybersecurity challenges rise amid Internet expansion
Cloudflare’s 2024 Year in Review report revealed significant growth in Internet usage and evolving cybersecurity threats, reports Silic...
Mandatory FCC cyber rules for telcos sought by new Senate legislation
Aside from requiring yearly vulnerability testing, patching, and documentation, U.S. telcos would also be mandated to ensure compliance...
Senate bill prohibiting health, location data brokerage unveiled
Health and location data sales and transfers among data brokers would be barred under new legislation unveiled by Sens. Elizabeth Warre...
Default NTLM relay attack protections introduced by Microsoft
SecurityWeek reports that Microsoft has moved to better combat NTLM relay attacks by standardizing the implementation of Extended Prote...
Funding round raises $45M for Astrix Security
Astrix Security, an Israeli access management startup focused on nonhuman identity security, has obtained $45 million from a Series B f...
Mozilla retires ‘Do Not Track’ option from Firefox browser
Mozilla will remove the “Do Not Track” privacy option from the Firefox browser, with the change already effective in development versio...
Intrusions leveraging widespread Cleo zero-day underway
BleepingComputer reports that attacks leveraging an improperly addressed Cleo management file transfer software vulnerability, tracked ...