stackArmor announced its Approval To Operate (ATO) for AI accelerator, that helps public sector and government organizations rapidly implement security and governance controls to manage risks associated with Generative... Read more »
Cybercriminals are leveraging the ZeroFont technique to trick users into trusting phishing emails, SANS ISC handler Jan Kopriva has warned. The ZeroFont phishing attack Documented and named by Avanan... Read more »
Appdome announced new mobile anti-malware protections that detect Android Accessibility Service Malware such as Xenomorph, Brasdex, Octo, Sharkbot, Flubot, TeaBot, PixPirate, Sova, Spynote, Joker and more. These malware are... Read more »
The Chrome zero-day exploited in the wild and patched by Google a few weeks ago has a new ID (CVE-2023-5129) and a description that tells the whole story: the... Read more »
OneTrust announces OneTrust AI Governance is now available on the Trust Intelligence Platform. OneTrust AI Governance enables visibility and transparency in adopting and governing AI use throughout the organization... Read more »
TeamViewer announced they are teaming with Ivanti, the tech company that elevates and secures Everywhere Work. This collaboration will leverage Ivanti’s mobile device management capabilities (Ivanti Neurons for MDM)... Read more »
Windows users looking to install the Bitwarden password manager may have inadvertently installed a remote access trojan (RAT). The ZenRAT malware A malicious website spoofing Bitwarden’s legitimate one (located... Read more »
Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to Veracode. Across all regions... Read more »
For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs that go beyond... Read more »
A recent study from Silverfort has identified the identity attack surface as today’s most substantial weakness in cybersecurity resilience. Traditional approaches, such as MFA and PAM, have notable limitations... Read more »
