Cybersecurity Blog
CISA Releases Cybersecurity Toolkit For Healthcare
A leading US cybersecurity agency has published a new set of online resources designed to help IT security leaders in ...
What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT – Help Net Security
The newly released Security and Exchange Commission (SEC) cyber incident disclosure rules have been met with mixed ...
Firefox, Chrome Updates Patch High-Severity Vulnerabilities
Mozilla and Google this week announced software updates for Firefox and Chrome that address multiple high-severity ...
iLeakage: New Safari Exploit Impacts Apple iPhones and Macs with A and M-Series CPUs
Oct 26, 2023NewsroomData Security / Vulnerability A group of academics has devised a novel side-channel attack dubbed ...
New iLeakage Attack Steals Emails, Passwords From Apple Safari
This attack bypasses standard side-channel protections implemented by browser vendors and can retrieve data from Safari, ...
Australia Focuses on Threat of Chinese Attack on Solar Power
Critical Infrastructure Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime New Standards ...
The Rise and Tactics of Octo Tempest: A Cyber Threat Analysis | Cyware Hacker News
Microsoft has been closely monitoring the activities of a threat group known as Octo Tempest. This group has emerged as ...
9 vulnerabilities found in VPN software, including 1 critical issue that could lead to remote code execution
Cisco Talos has disclosed 17 vulnerabilities over the past two weeks, including nine that exist in a popular VPN ...