Tag: High
-
Cyber Attack Surge by 28%:Education Sector at High Risk
In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average number of cyber attacks per organization per week, …
-
Urgent High Severity Security Backdoor Found In Popular Linux Utility
Over the past few days, the security world has been abuzz with the discovery of a security backdoor snuck into a compression utility called …
-
AWS Wickr achieves FedRAMP High authorization
“For many federal agencies and organizations, having the ability to securely communicate and share information—whether in an office or …
-
AMD Issues BIOS Fixes For Several High Severity Zen Exploits, Update ASAP
Okay, short version: AMD Ryzen and EPYC processors are vulnerable to some serious security exploits, so you should get snappy about …
-
Ransomware Payments Hit $1bn All-Time High Last Year
Ransomware actors collected over $1bn in extortion money from their victims in 2023 – a record high – according to Chainalysis. The …
-
Ransomware Incidents Hit Record High, But Law Enforcement Takedowns Slow Growth
Ransomware incidents surged by 68% in 2023 to reach a record high, according to new data from Corvus Insurance. However, law enforcement …
-
High Consequences Cyber: Make or Break the CISO’s Reputation – Andy Jaquith – CSP #154
“High Consequences Cyber” are high-risk, high-stakes cyber projects that can make or break a company or make or break the CISO’s …
-
High number of security flaws found in EMEA-developed apps
Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their …
-
Address High Scale Google Drive Data Exposure with Bulk Remediation
Organizations looking to protect themselves from this risk should look to bulk remediate their data security. By bulk remediating, IT …
-
Threat Report: The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic
How To Use This Report Enhance situational awareness of techniques used by threat actors Identify potential attacks targeting your industry …
-
Are You Willing to Pay the High Cost of Compromised Credentials?
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure …
-
High severity vuln in WinRAR could allow code to run when files are opened
Users of the popular WinRAR compression and archiving tool should update now to avoid a vulnerability that allows code to be run when a …
●●●