NCSC: UK Organizations Can Learn from Ukraine’s Impressive Cyber Defenses
NCSC CEO, Lindy Cameron, outlines the UK’s observations of the cyber dimension of the Russia-Ukraine conflict
Cyber NewsNCSC CEO, Lindy Cameron, outlines the UK’s observations of the cyber dimension of the Russia-Ukraine conflict
Cyber NewsThis blog was written by an independent guest blogger. Despite the ongoing rise in social engineering attacks, the idea that cybersecurity is only about technology manifests within most of our minds. Organizations often neglect human behavior’s impact on their cybersecurity postures. Instead, they spend lavishly on endpoint security tools, threat hunting programs, and building incident […]
Cyber NewsThe liability rules allow for compensation for damage when manufacturers fail to address cybersecurity vulnerabilities
Cyber NewsMicrosoft officially disclosed it investigating two zero-day security vulnerabilities impacting Exchange Server 2013, 2016, and 2019 following reports of in-the-wild exploitation. “The first vulnerability, identified as CVE-2022-41040, is a Server-Side Request Forgery (SSRF) vulnerability, while the second, identified as CVE-2022-41082, allows remote code execution (RCE) when PowerShell is
Cyber NewsSecurity researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in real-world attacks to achieve remote code execution on affected systems. That’s according to Vietnamese cybersecurity company GTSC, which discovered the shortcomings as part of its security monitoring and incident response efforts in August 2022. The
Cyber NewsMultiple providers say ‘cloud data sprawl’ makes managing cloud data risk a priority initiative within the next 12 months.
Cyber NewsThis new function offers secure access to corporate applications and external SaaS through a virtual browser.
Cyber NewsSecurity service provider selects cybersecurity training platform to safeguard enterprises in LATAM.
Cyber NewsCompanies collaborate to strengthen organizations’ first line of security defense – end users.
Cyber News