Featured Featured | IT solutions | Movers & Shakers | TechTime | December 6, 2024 Tenable Unveils Autonomous Patch Solution Exposure management company Tenable has released an autonomous patch solution called Tenable Patch Management. It offers a unified solution to… Read More Artificial Intelligence Artificial Intelligence | Cyber Resilience | Featured | IT solutions | vulnerabilities | September 18, 2024 Vectra AI Identifies Google Cloud Document AI Service Vulnerability Vectra AI has identified a vulnerability in Google Cloud’s Document AI Service that exposes users to data infiltration risks. The… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Vulnerability Scanning Activity Soars During Paris Olympics Imperva has identified a 770,000% increase in vulnerability scanning activity on Olympic-related sites from June to July 2024, indicating a… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | February 15, 2024 Trend Micro Discovers Actively Exploited Vulnerability Trend Micro has announced its discovery of a vulnerability in Microsoft Windows Defender that is actively being exploited by cyberthreat group… Read More Featured Featured | IT solutions | vulnerabilities | December 20, 2023 Vulnerability Rating Taxonomy for LLMs Bugcrowd has announced updates to the Vulnerability Rating Taxonomy (VRT) that define and prioritize crowdsourced vulnerabilities in Large Language Models (LLMs) for the first… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 17, 2023 Cyber-physical Systems Vulnerability Disclosures Reach Peak Cyber-physical system vulnerabilities disclosed in the second half (2H) of 2022 have declined by 14% since hitting a peak during… Read More Featured Featured | IT solutions | Risk Management | vulnerabilities | December 1, 2022 72% of Organisations Still Vulnerable to Log4j Vulnerability Tenable today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell,… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 19, 2022 Employees on the Cyber Frontline In the first quarter of 2022, employees found themselves more than ever at the front line of cyber defense. In… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Artificial Intelligence Artificial Intelligence | Cyber Resilience | Featured | IT solutions | vulnerabilities | September 18, 2024 Vectra AI Identifies Google Cloud Document AI Service Vulnerability Vectra AI has identified a vulnerability in Google Cloud’s Document AI Service that exposes users to data infiltration risks. The… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Vulnerability Scanning Activity Soars During Paris Olympics Imperva has identified a 770,000% increase in vulnerability scanning activity on Olympic-related sites from June to July 2024, indicating a… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | February 15, 2024 Trend Micro Discovers Actively Exploited Vulnerability Trend Micro has announced its discovery of a vulnerability in Microsoft Windows Defender that is actively being exploited by cyberthreat group… Read More Featured Featured | IT solutions | vulnerabilities | December 20, 2023 Vulnerability Rating Taxonomy for LLMs Bugcrowd has announced updates to the Vulnerability Rating Taxonomy (VRT) that define and prioritize crowdsourced vulnerabilities in Large Language Models (LLMs) for the first… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 17, 2023 Cyber-physical Systems Vulnerability Disclosures Reach Peak Cyber-physical system vulnerabilities disclosed in the second half (2H) of 2022 have declined by 14% since hitting a peak during… Read More Featured Featured | IT solutions | Risk Management | vulnerabilities | December 1, 2022 72% of Organisations Still Vulnerable to Log4j Vulnerability Tenable today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell,… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 19, 2022 Employees on the Cyber Frontline In the first quarter of 2022, employees found themselves more than ever at the front line of cyber defense. In… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Vulnerability Scanning Activity Soars During Paris Olympics Imperva has identified a 770,000% increase in vulnerability scanning activity on Olympic-related sites from June to July 2024, indicating a… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | February 15, 2024 Trend Micro Discovers Actively Exploited Vulnerability Trend Micro has announced its discovery of a vulnerability in Microsoft Windows Defender that is actively being exploited by cyberthreat group… Read More Featured Featured | IT solutions | vulnerabilities | December 20, 2023 Vulnerability Rating Taxonomy for LLMs Bugcrowd has announced updates to the Vulnerability Rating Taxonomy (VRT) that define and prioritize crowdsourced vulnerabilities in Large Language Models (LLMs) for the first… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 17, 2023 Cyber-physical Systems Vulnerability Disclosures Reach Peak Cyber-physical system vulnerabilities disclosed in the second half (2H) of 2022 have declined by 14% since hitting a peak during… Read More Featured Featured | IT solutions | Risk Management | vulnerabilities | December 1, 2022 72% of Organisations Still Vulnerable to Log4j Vulnerability Tenable today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell,… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 19, 2022 Employees on the Cyber Frontline In the first quarter of 2022, employees found themselves more than ever at the front line of cyber defense. In… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | February 15, 2024 Trend Micro Discovers Actively Exploited Vulnerability Trend Micro has announced its discovery of a vulnerability in Microsoft Windows Defender that is actively being exploited by cyberthreat group… Read More Featured Featured | IT solutions | vulnerabilities | December 20, 2023 Vulnerability Rating Taxonomy for LLMs Bugcrowd has announced updates to the Vulnerability Rating Taxonomy (VRT) that define and prioritize crowdsourced vulnerabilities in Large Language Models (LLMs) for the first… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 17, 2023 Cyber-physical Systems Vulnerability Disclosures Reach Peak Cyber-physical system vulnerabilities disclosed in the second half (2H) of 2022 have declined by 14% since hitting a peak during… Read More Featured Featured | IT solutions | Risk Management | vulnerabilities | December 1, 2022 72% of Organisations Still Vulnerable to Log4j Vulnerability Tenable today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell,… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 19, 2022 Employees on the Cyber Frontline In the first quarter of 2022, employees found themselves more than ever at the front line of cyber defense. In… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Featured Featured | IT solutions | vulnerabilities | December 20, 2023 Vulnerability Rating Taxonomy for LLMs Bugcrowd has announced updates to the Vulnerability Rating Taxonomy (VRT) that define and prioritize crowdsourced vulnerabilities in Large Language Models (LLMs) for the first… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 17, 2023 Cyber-physical Systems Vulnerability Disclosures Reach Peak Cyber-physical system vulnerabilities disclosed in the second half (2H) of 2022 have declined by 14% since hitting a peak during… Read More Featured Featured | IT solutions | Risk Management | vulnerabilities | December 1, 2022 72% of Organisations Still Vulnerable to Log4j Vulnerability Tenable today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell,… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 19, 2022 Employees on the Cyber Frontline In the first quarter of 2022, employees found themselves more than ever at the front line of cyber defense. In… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 17, 2023 Cyber-physical Systems Vulnerability Disclosures Reach Peak Cyber-physical system vulnerabilities disclosed in the second half (2H) of 2022 have declined by 14% since hitting a peak during… Read More Featured Featured | IT solutions | Risk Management | vulnerabilities | December 1, 2022 72% of Organisations Still Vulnerable to Log4j Vulnerability Tenable today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell,… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 19, 2022 Employees on the Cyber Frontline In the first quarter of 2022, employees found themselves more than ever at the front line of cyber defense. In… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Featured Featured | IT solutions | Risk Management | vulnerabilities | December 1, 2022 72% of Organisations Still Vulnerable to Log4j Vulnerability Tenable today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell,… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 19, 2022 Employees on the Cyber Frontline In the first quarter of 2022, employees found themselves more than ever at the front line of cyber defense. In… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 19, 2022 Employees on the Cyber Frontline In the first quarter of 2022, employees found themselves more than ever at the front line of cyber defense. In… Read More Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Cyber Resilience Cyber Resilience | Data Breach | vulnerabilities | February 23, 2022 Australia Sinks in Global Phishing Ranking Proofpoint has released its eighth annual State of the Phish report, which provides an in-depth look at user phishing awareness,… Read More Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next
Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | Featured | vulnerabilities | February 11, 2022 Log4Shell: No Mass Abuse, But No Respite, What Happened? By Chester Wisniewski Principal research scientist, Sophos. Sometimes, when a software crisis doesn’t cause the kind of devastation everyone expects,… Read More 1 2 3 Next