Power outage darkens Cloudflare dashboard and APIs As of this recording, Cloudflare continues to struggle with an outage that has affected its customers’ ability to…
In increasingly complex technical defenses, threat actors frequently target the human element. This makes them a top attack vectors, but are they actually the weak…
Canada bans WeChat on government devices The Treasury Board of Canada announced the move, saying that the country’s chief information officer determined the Chinese messaging…
Executive order outlines generative AI rules in the US President Biden signed the order, which outlines eight goals for the emerging tech. NIST will develop…
This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Arvin Bansal, former CISO, Nissan Americas Cyber Security Headlines…
iLeakage attack steals emails, passwords from Apple devices and browsers A team of academics from Georgia Tech, University of Michigan, and Ruhr University Bochum, have…
We often talk about the contradiction of seemingly entry-level security jobs requiring years of experience. But maybe that’s because entry-level jobs don’t actually exist. Check…
SMIC making advanced chips with ASML tech Bloomberg’s sources say China’s largest domestic chip producer used ASML’s immersion deep ultraviolet machines to produce advanced chips…
Upskilling talent is a laudable goal for any organization, but getting there requires some careful consideration. Part of this needs to be finding a commonality…
Chrome testing IP Protection Google plans to test this new feature in Chrome. This will route third-party traffic from specific domains through proxies, hiding the…
Okta HAR support system attacked An advisory from Okta states that last week’s attack involved threat actors gaining access to customers’ HTTP Archive files, short…
This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Andrew Wilder, CISO, Community Veterinary Partners Cyber Security Headlines…
International sting operation brings down RagnarLocker Agencies from the US, Japan and the EU have successfully seized the dark web portal used by the gang.…
The Securities and Exchange Commission issued new cyber rules. What do these new rules mean for CISOs and will they ultimately improve our cybersecurity posture?…
State-backed attackers exploit WinRAR zero-day Security researchers at Google found evidence that state-sponsored threat actors linked to China and Russia began exploiting a vulnerability in…
Like any new technology, generative AI can seem miraculous at first glance. Regardless of how impressive things like ChatGPT are, they are just tools. They…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.