The ENISA released its report on pseudonymisation for personal data protection, providing a technical analysis of cybersecurity measures in personal data protection and privacy.
An exploitable integer overflow and heap-based buffer overflow vulnerabilities exists in the PlanMaker document-parsing functionality of SoftMaker Office 2021’s PlanMaker application.
According to a study by email security firm Avanan, email threats reported by users or other mechanisms take two to three hours of a SOC teams time per day, or 22.9% of a SOC team’s daily routine.
In a rapidly changing business environment, the role of the CISO has hugely expanded in its scope and responsibilities, a BT Security survey of over 7000 professionals from across the world reveals.
The security of open source software has rightfully garnered the industry’s attention, but solutions require consensus about the challenges and cooperation in the execution.
Stormshield is a major provider of network security products to the French government, some used on sensitive networks, so it is being treated as a major security breach inside the French government.
Fraudsters had an early start anticipating the buzz surrounding tax filing season, with phishing campaigns impersonating the government agency as early as November 25, 2020, according to Bitdefender.
Trickbot recently added a fresh module to scan local network systems with open ports for quick lateral movement. Names masrv, the component incorporates a copy of the Masscan open-source utility.
Retail firms are back on the targets of cyber adversaries; several organizations were hit by a variety of threats including phishing campaigns, code injection, and ransomware attacks lately.
Estate agent Foxtons Group is under pressure after a daily newspaper claimed that thousands of customers’ card and personal details have been uploaded to a dark web site.