A patch is forthcoming for a privilege escalation vulnerability in the Windows operating system that can allow hackers to gain a foothold. Meanwhile, Linux OS users also need to adopt system upgrades to fix a flaw, and Oracle and Juniper have announced product patches.
As both internal and external business pressures continue to heighten the focus on the Risk Management function, the interest in improving the executive level understanding of risk reporting is also rapidly growing. Typically, the gap that exists stems from the lack of a common language for risks and mitigating or...
Global research uncovers IT security leaders’ key strategies for cloud complexity, remote work and supply chain attacks.
Security organizations have always been hard-pressed to keep up with the rising tide of data, the ever-expanding perimeter, and the increasing frequency and sophistication of attacks. Our...
Following revelations that commercial spyware vendor NSO Group was able to exploit the latest model of the Apple iPhone to install surveillance software, experts describe how Apple could be doing more to lock down its iOS mobile operating system as well as curtail attacks by making them much costlier to run.
Can NSO Group and other commercial spyware vendors survive the latest revelations into how their tools get used? The Israeli firm is again being accused of selling spyware to repressive regimes, facilitating the surveillance of journalists, political opponents, business executives and even world leaders.
Many security experts and analysts are applauding the U.S. for calling out China's cyber behavior, especially after the White House had focused so much attention on Russia's cyber activities. But some are calling for bolder action.
The leaking of an alleged target list of 50,000 individuals, tied to users of NSO Group's Pegasus spyware, has prompted questions over the scale of such surveillance operations, if the use of commercial spyware gets sufficiently policed and whether the sale of spyware to certain countries should be blocked.
Campbell Conroy & O’Neil, a Boston-based law firm that serves Fortune 500 firms, including Apple and Pfizer, is continuing its investigation of a ransomware attack in February that resulted in unauthorized access to certain data about its clients.
The blockchain analysis firm Elliptic offers a step-by-step case study, based on its research, of how one victim of the REvil ransomware gang negotiated a lower ransom payment. The study offers insights into how REvil operated before its online infrastructure disappeared last week.
Holistic visibility across OT and IoT is a must for accelerated digital transformation especially for healthcare technology companies. This case study discusses how a healthcare technology company gained visibility across it globally distributed
manufacturing processes and tackled its challenges.
Read this case...
To improve cyber resilience, many utilities are evaluating
options for augmenting the cybersecurity of their OT and
IoT networks. One fundamental security best practice is
having real-time visibility into cybersecurity attacks, risks
and incidents.
This paper illustrates how a network visibility...
Transportation and logistics organizations are rapidly evolving to improve their service levels and
efficiency. At the same time, safety has never been more important, as risks from cyber threats
increase. The World Economic Forum cited cyberattacks on critical infrastructure, including
transportation, as the...
The convergence between IT and OT worlds is increasing, which brings many opportunities but also increases the attack surface, making it necessary to take appropriate security measures. The Oil & Gas sector has some features that make it different from other industries. The challenges the sector faces are also unique....
Nozomi Networks Vantage™ leverages the power and simplicity of software as a service
(SaaS) to deliver unmatched security and visibility across your OT, IoT, and IT networks.
Vantage accelerates digital transformation for the largest and most complex
distributed networks.
Vantage delivers the immediate awareness...
The U.S. has indicted four Chinese nationals working with the nation's Ministry of State Security in connection with an alleged hacking campaign conducted from 2011 to 2018 that targeted universities and government entities to obtain trade secrets, medical research and other intellectual property.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.