Leading CISO Wants More Security Proactivity in Australian Businesses to Avoid Attack ‘Surprises’

The complexity and change experienced by organisations as they grow is one reason we are seeing similar cyber security risks to a decade ago, says Rapid7’s CISO Jaya Baloo. However,…

Continue ReadingLeading CISO Wants More Security Proactivity in Australian Businesses to Avoid Attack ‘Surprises’

New Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers

The number of devices exposing the web UI on the internet, a timeline and technical details about this malicious activity, and tips for mitigating this zero-day threat are featured. Cisco…

Continue ReadingNew Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers

Browse Safer and Faster Around the World with JellyVPN — Now Just $34.99

This high-speed, unlimited VPN offers quality connections all over the globe. Get huge savings now when you sign up for life at TechRepublic Academy. Image: StackCommerce With cybercrime on the…

Continue ReadingBrowse Safer and Faster Around the World with JellyVPN — Now Just $34.99

Cisco to Acquire Splunk for $28 Billion, Accelerating AI-Enabled Security and Observability

On Thursday Cisco agreed to buy Splunk in a $28 billion deal intended to address AI-enabled security and observability issues. Image: iStockphoto\/jejim Cisco announced yesterday its intention to acquire Splunk,…

Continue ReadingCisco to Acquire Splunk for $28 Billion, Accelerating AI-Enabled Security and Observability

Intel Innovation 2023: Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as provide policy enforcements and audits. Image: JHVEPhoto/Adobe Stock The second…

Continue ReadingIntel Innovation 2023: Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

5 Tips for Securing Data When Using a Personal Mac for Work

[embedded content] The temptation to use your personal Mac to check work email, confirm a professional appointment, access an employer’s cloud-based app or draft a business document is difficult to…

Continue Reading5 Tips for Securing Data When Using a Personal Mac for Work

Check Point: Hackers Are Dropping USB Drives at Watering Holes

Image: Timon/Adobe Stock In its 2023 Mid-Year Cyber Security Report, Check Point Software spotlighted numerous exploits so far this year, including novel uses of artificial intelligence and an old-school attack…

Continue ReadingCheck Point: Hackers Are Dropping USB Drives at Watering Holes

UK’s NCSC Warns Against Cybersecurity Attacks on AI

The National Cyber Security Centre provides details on prompt injection and data poisoning attacks so organizations using machine-learning models can mitigate the risks. Image: Michael Traitov/Adobe Stock Large language models…

Continue ReadingUK’s NCSC Warns Against Cybersecurity Attacks on AI

Cisco Talos Research: New Lazarus Group Attack Malware Campaign Hits UK & US Businesses

The Cisco Talos report exposes new malware used by the group to target Internet backbone infrastructure and healthcare organizations in the U.K. and the U.S. Image: SomYuZu/Adobe Stock Two reports…

Continue ReadingCisco Talos Research: New Lazarus Group Attack Malware Campaign Hits UK & US Businesses