Even though going to the cloud isn’t new, organizations often don’t know their responsibilities across various services. It doesn’t help that this changes based on…
LinkedIn accounts hacked in widespread hijacking campaign On Tuesday, a wave of LinkedIn user reports surfaced indicating their accounts had been locked out or hijacked…
We’re seeing increasing recognition that cybersecurity jobs should focus on competency rather than years of experience. But how do you create job posts to encourage…
Moovit bug allowed for free rides Security researchers with SafeBreach disclosed a bug in the popular Intel-owned transformation app Moovit. Using a chain of exploits,…
We’ve seen a lot of security concerns around the use of generative AI tools, particularly around data leaks. These new technologies provide challenges around how…
Ford says cars with WiFi vulnerability still safe to drive The Ford Motor Corporation is warning of a buffer overflow vulnerability in its SYNC3 infotainment…
This week’s Cyber Security Headlines – Week in Review, August 7-11, is hosted by Rich Stroffolino with guest, Michael Woods, CISO, GE Cyber Security Headlines…
CISA warns organizations of exploited vulnerability affecting .NET, Visual Studio CISA has added a zero-day flaw affecting Microsoft’s .NET and Visual Studio products to its…
AI Cyber Challenge announced at Black Hat Officials with the Biden administration launched the DARPA-led initiative at the event. Over the next two-years, this will…
White House rolls out school cyber initiatives It’s no secret that cyber attacks against educational institutions have increased over the past few years. We’ve covered…
Microsoft resolves vulnerability following criticism from Tenable CEO Microsoft has now resolved the Azure AD vulnerability. Amit Yoran, CEO of cybersecurity firm Tenable, published a…
This week’s Cyber Security Headlines – Week in Review, July 31-August 4, is hosted by Rich Stroffolino with guest, Jeff Hudesman, CISO, Pinwheel Cyber Security…
Fortinet VPN bug tops CISA’s list of most exploited vulnerabilities in 2022 The most exploited vulnerability of last year was actually disclosed back in 2018…
Cybersecurity events never come to San Diego, but we got one! The International Cybersecurity Championship, a four-day Capture the Flag competition for 18-25 year olds…
We’ll be the closing entertainment of the Convene conference, a full day event about security awareness at the Watergate Hotel in Washington, DC. Event will…
Australian Senate recommends banning WeChat The Australian Senate’s Select Committee on Foreign Interference recommended banning all Chinese social media apps in the country, including the…
Musk sues disinformation researchers for driving away advertisers The company formerly known as Twitter is suing the Center for Countering Digital Hate, that researches hate…
White House releases National Cyber and Workforce Education Strategy According to the Office of the National Cyber Director, this new strategy will seek to create…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.