From cleaners to creepers: The risk of mobile privilege escalation

In this Help Net Security video, Nico Chiaraviglio, Chief Scientist at Zimperium, explores how Android apps can be abused to escalate privileges, giving attackers access to sensitive data and... Read more »

Employees are using AI where they know they shouldn’t

Despite widespread anticipation about AI’s positive impact on workforce productivity, most employees feel they were overpromised on its potential, according to GoTo. In fact, 62% believe AI has been... Read more »

What is an advanced persistent threat (APT)?

An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. Read more »

Cyber action plan kicks off to ‘supercharge’ UK security sector

UK government says its cyber growth action plan will provide a large boost to Britain’s security industry as it sets out to create a roadmap for future growth Read more »

Scattered Spider widens web to target insurance sector

Following a series of high-profile attacks on prominent retailers and consumer brands, the Scattered Spider cyber crime collective appears to be expanding its targeting to the insurance sector Read more »

What is confidential computing?

Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use. It is especially suitable for public clouds. Read more »

Researchers unearth keyloggers on Outlook login pages

Unknown threat actors have compromised internet-accessible Microsoft Exchange Servers of government organizations and companies around the world, and have injected the organizations’ Outlook on the Web (OWA) login page... Read more »

Aravo Evaluate Engine manages and optimizes third-party risks

Aravo announced new innovations that add significant enhancements to its Evaluate Engine, enabling customers to extend the scale, scope, and range of their third-party risk scoring to meet their... Read more »

U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple... Read more »

What is market concentration?

Market concentration refers to how a market is distributed among competing companies. Read more »
Subscribe to our Newsletter