No menu items!
No menu items!
More

    THN

    E.U. Court Limits Meta’s Use of Personal Facebook Data for Targeted Ads

    Oct 07, 2024Ravie LakshmananData Privacy / Advertising Europe's top court has ruled that Meta Platforms must restrict the use of personal data harvested from...

    Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability

    Oct 05, 2024Ravie LakshmananData Privacy / Mobile Security Apple has released iOS and iPadOS updates to address two security issues, one of which could...

    U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown

    Oct 04, 2024Ravie LakshmananPhishing Attack / Cybercrime Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains...

    WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks

    Oct 04, 2024Ravie LakshmananWebsite Security / Vulnerability A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could...

    Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors

    Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65...

    How to Get Going with CTEM When You Don’t Know Where to Start

    Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex...

    Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks

    Oct 03, 2024Ravie LakshmananMobile Security / Technology Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to...

    The Secret Weakness Execs Are Overlooking: Non-Human Identities

    For years, securing a company's systems was synonymous with securing its "perimeter." There was what was safe "inside" and the unsafe outside world....

    New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

    Oct 03, 2024Ravie LakshmananLinux / Malware Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the...

    Latest articles

    spot_imgspot_img