Tag: Lights
-
Identity in the Shadows: Shedding Light on Cybersecurity’s Unseen Threats
In today’s rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats. The proliferation …
-
HISCOX Cyber Readiness Report Shines Light on Commercial Cybersecurity
One of the most important concerns for organizations of all sizes is protection against cyberattacks and other digital threats to security. …
-
Your Tablet’s Light Sensor Can Spy On You
Most people are probably aware of the privacy risks posed by the front-facing camera on their mobile device or laptop, and so can take …
-
Shining Light on Employee Cybersecurity Awareness in Retail
Individual users are often referred to as the weakest link in cybersecurity, as human error is a major contributor to security incidents of …
-
New Study Sheds Light on Adhubllka Ransomware Network
Cybersecurity researchers have unveiled a complex web of interconnected ransomware strains that trace their origins back to a common …
-
Researchers Shed Light on APT31’s Advanced Backdoors and Data Exfiltration Tactics
The Chinese threat actor known as APT31 (aka Bronze Vinewood, Judgement Panda, or Violet Typhoon) has been linked to a set of advanced …
-
PsiQuantum’s Latest Quantum Computing Research Sheds Light on ECC Vulnerabilities
PALO ALTO, Calif., June 16, 2023 — PsiQuantum has announced in a new publication, a thorough resource count for how large a quantum …
-
Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks
Fortra, the company behind Cobalt Strike, shed light on a zero-day remote code execution (RCE) vulnerability in its GoAnywhere MFT tool …
-
Researchers Shed Light on CatB Ransomware’s Evasion Techniques
The threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to evade …
-
Leveraging the Traffic Light Protocol helps CISOs share threat data effectively
As cyber threats continue to evolve and become increasingly sophisticated, it is critical for organizations to share …
-
What is Traffic Light Protocol? Here’s how it supports CISOs in sharing threat data
Traffic Light Protocol (TLP) was created to facilitate greater sharing of potentially sensitive threat information within an organization …
-
New Survey Sheds Light on Why Enterprises Struggle to Thwart API Attacks
Corsha’s Annual State of API Secrets Management Report finds over 50% of respondents suffered a data breach due to compromised API …
●●●