No menu items!
No menu items!
More

    THN

    Ukraine Bans Telegram Use for Government and Military Personnel

    Sep 21, 2024Ravie LakshmananNational Security / Cyber Attack Ukraine has restricted the use of the Telegram messaging app by government officials, military personnel, and...

    Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks

    A hacktivist group known as Twelve has been observed using an arsenal of publicly available tools to conduct destructive cyber attacks against Russian...

    LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO

    Sep 21, 2024Ravie LakshmananPrivacy / Artificial Intelligence The U.K. Information Commissioner's Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing...

    Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

    Law enforcement authorities have announced the takedown of an international criminal network that leveraged a phishing platform to unlock stolen or lost mobile...

    The Future of (Privileged) Access Management

    In IT environments, some secrets are managed well and some fly under the radar. Here's a quick checklist of what kinds of secrets...

    Iranian APT UNC1860 Linked to MOIS Facilitates Cyber Intrusions in Middle East

    An Iranian advanced persistent threat (APT) threat actor likely affiliated with the Ministry of Intelligence and Security (MOIS) is now acting as an...

    Chrome Users Can Now Sync Passkeys Across Devices with New Google PIN Feature

    Sep 20, 2024Ravie LakshmananEncryption / Digital Security Google on Thursday unveiled a Password Manager PIN to let Chrome web users sync their passkeys across...

    Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks

    Sep 20, 2024Ravie LakshmananEnterprise Security / Network Security Ivanti has revealed that a critical security flaw impacting Cloud Service Appliance (CSA) has come under...

    Wherever There’s Ransomware, There’s Service Account Compromise. Are You Protected?

    Until just a couple of years ago, only a handful of IAM pros knew what service accounts are. In the last years, these...

    Latest articles

    spot_imgspot_img