The Next Iteration of Privacy: What Businesses Should Know About New Privacy Laws in Oregon, Texas, and Florida
As businesses enter the third quarter of 2024, they need to contend with three new state privacy laws. The Texas…
As businesses enter the third quarter of 2024, they need to contend with three new state privacy laws. The Texas…
A new variant of the RomCom malware called SnipBot, has been used in attacks that pivot on the network to…
Infostealer malware developers released updates claiming to bypass Google Chrome's recently introduced feature App-Bound Encryption to protect sensitive data such as…
A researcher bypassed the Calendar sandbox, Gatekeeper, and TCC in a chain attack that allowed for wanton theft of iCloud…
Attackers have been using the Windows MSHTML Platform spoofing vulnerability in conjunction with another zero-day flaw.
GitLab has released critical updates to address multiple vulnerabilities, the most severe of them (CVE-2024-6678) allowing an attacker to trigger pipelines…
Do you like a spirited drive? Or do you have a bit of a lead foot? Or do you just…
I was thrilled to catch up with Elisity during Black Hat USA 2024. Elisity’s platform makes it easy for IT,…
The company has assessed four of the five disclosed vulnerabilities as being of high to critical severity.
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and…