Implementation of Zero Trust controls for compliance

The ThreatLocker® Zero Trust Endpoint Protection platform implements a rigorous deny-by-default and allow-by-exception security approach to give organizations the ability to set policy-based controls within their environment and mitigate countless…

Artificial intelligence will not solve the problem of maintaining cybersecurity

COMMENT Artificial intelligence (AI) continues to advance cybersecurity analytics capabilities, with AI-based natural language processing, volumetric computing, and anomaly detection handling many of the incident investigation tasks typically performed by…

The US Department of Justice sues Apple over messaging monopoly and security

March 22, 2024PressroomPrivacy/Encryption The US Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple of unlawfully maintaining a monopoly on smartphones, thereby…

Session Takeover Bug in AWS Apache Airflow Reveals Greater Cloud Risk

A vulnerability in Amazon Web Services (AWS) managed workflows for Apache Airflow (MWAA) could have allowed attackers to access user sessions, perform remote code execution (RCE), move laterally into of…

300,000 Internet hosts at risk of ‘devastating’ loop DoS attacks.

Researchers have found that a new type of self-perpetuating denial-of-service (DoS) attack that targets application-level messages has the potential to compromise 300,000 Internet hosts and may be difficult to stop…

Russian hackers target Ukrainian telecoms with updated ‘AcidPour’ malware

March 22, 2024PressroomLinux/Cyber ​​warfare The data deletion malware called AcidPour may have been used in attacks against four telecom operators in Ukraine, new findings from SentinelOne show. The cybersecurity firm…

Ivanti keeps security teams struggling with 2 more vulnerabilities

Ivanti, whose products have been a big target for attackers recently, has disclosed two more critical vulnerabilities in its technologies, raising further questions about the security of its products in…

Concepts of identity are the basis of the “perfect storm” of cyber risk

Security teams are facing “the perfect storm” these days, with four seemingly important factors at play: artificial intelligence and Generative AI; geopolitical dynamics; modification of regulatory compliance requirements; and, in…

US sanctions Russians behind ‘Doppelganger’ cyber influence campaign.

March 21, 2024PressroomNational Security/Data Privacy The US Treasury Department’s Office of Foreign Assets Control (OFAC) on Wednesday announced sanctions against two 46-year-old Russian citizens and their respective companies for engaging…

Tesla Hack Team wins $200,000 and a new car

Cybersecurity researchers are winning hundreds of thousands of dollars in cash and prizes in the Pwn2Own contest, discovering previously unknown vulnerabilities in widely used products like Adobe Reader, Windows 11,…