BBC disclosed a data breach impacting its Pension Scheme members

The BBC disclosed a data breach that exposed the personal information of BBC Pension Scheme members. The BBC disclosed a data breach that occurred on May 21. Threat actors... Read more »

Law student ‘unfairly disciplined’ after reporting data breach blunder

Read more »

Lack of skills and budget slow zero-trust implementation

The risk of a cyber breach is the number one global driver for zero trust strategy implementation, according to Entrust. The 2024 State of Zero Trust & Encryption Study... Read more »

Encrypted Notepad: Open-source text editor

Encrypted Notepad, an open-source text editor, ensures your files are saved and loaded encrypted with AES-256. With no ads, no network connection required, and no unnecessary features, it’s a... Read more »

New infosec products of the week: May 31, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, Dashlane, Detectify, and Truecaller. Adaptive Shield unveils platform enhancements to improve SaaS... Read more »

Proofpoint’s CISO 2024 Report: Top Challenges Include Human Error & Risk

This new report also indicates an increasing attack surface as putting pressure on CISOs. One positive note is CISOs’ improving relationships with board members. Read more »

CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog

CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to... Read more »

Experts found a macOS version of the sophisticated LightSpy spyware

Researchers spotted a macOS version of the LightSpy surveillance framework that has been active in the wild since at least January 2024. Researchers from ThreatFabric discovered a macOS version... Read more »

What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature

The malware exploits Windows BitLocker to encrypt corporate files. Read more »

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?

Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in cybersecurity. These attacks exposed a critical challenge for Chief... Read more »
Subscribe to our Newsletter