BRATA now targeting a specific financial institution at a time
Governance Gap Raises AI Security Concerns
Cyber now seen as most important component for adoption
QNAP Customers Hit by Double Ransomware Blitz
Taiwanese manufacturer braced for twin threat
Investigators Disrupt Giant RSocks Botnet
Russian cyber-criminals rented it out to other groups
The Matrix, policy edition
Inspired by an insightful comment on LinkeDin from an SC 27 colleague on the other side of the world (thanks Lars!), I spent most of last week updating the SecAware security policy templates and ISO27k ISMS materials.The main change was to distinguish …
Microsoft Addresses Wi-Fi Hotspots Issues in Latest Update
Host devices might lose connection to the internet after client device connects
US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes
Hao Kuo Chi illegally obtained iCloud credentials of 4700 victims
WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability
The code injection vulnerability allowed attackers to call methods in various Ninja Forms classes
What’s the Value of a Key-Value Store?
Learn about the benefits and drawbacks of a key-value store: a data structure designed for storing and returning values associated with keys as unique identifiers.
Experts Discuss Next Steps in Trust, Privacy and Security
The complex interrelation between trust, privacy and cybersecurity was discussed by experts during Okta Forum 2022