stackArmor ATO for AI accelerates safe AI adoption for public sector organizations

stackArmor announced its Approval To Operate (ATO) for AI accelerator, that helps public sector and government organizations rapidly implement security and governance controls to manage risks associated with Generative... Read more »

New twist on ZeroFont phishing technique spotted in the wild

Cybercriminals are leveraging the ZeroFont technique to trick users into trusting phishing emails, SANS ISC handler Jan Kopriva has warned. The ZeroFont phishing attack Documented and named by Avanan... Read more »

Appdome unveils mobile anti-malware protections

Appdome announced new mobile anti-malware protections that detect Android Accessibility Service Malware such as Xenomorph, Brasdex, Octo, Sharkbot, Flubot, TeaBot, PixPirate, Sova, Spynote, Joker and more. These malware are... Read more »

Google “confirms” that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129)

The Chrome zero-day exploited in the wild and patched by Google a few weeks ago has a new ID (CVE-2023-5129) and a description that tells the whole story: the... Read more »

OneTrust AI Governance helps organizations manage AI systems and mitigate risk

OneTrust announces OneTrust AI Governance is now available on the Trust Intelligence Platform. OneTrust AI Governance enables visibility and transparency in adopting and governing AI use throughout the organization... Read more »

TeamViewer and Ivanti simplify the complex task of managing and securing remote devices

TeamViewer announced they are teaming with Ivanti, the tech company that elevates and secures Everywhere Work. This collaboration will leverage Ivanti’s mobile device management capabilities (Ivanti Neurons for MDM)... Read more »

Fake Bitwarden installation packages delivered RAT to Windows users

Windows users looking to install the Bitwarden password manager may have inadvertently installed a remote access trojan (RAT). The ZenRAT malware A malicious website spoofing Bitwarden’s legitimate one (located... Read more »

High number of security flaws found in EMEA-developed apps

Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to Veracode. Across all regions... Read more »

The pitfalls of neglecting security ownership at the design stage

For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs that go beyond... Read more »

Is your identity safe? Exploring the gaps in threat protection

A recent study from Silverfort has identified the identity attack surface as today’s most substantial weakness in cybersecurity resilience. Traditional approaches, such as MFA and PAM, have notable limitations... Read more »
Subscribe to our Newsletter