Rethinking Democracy for the Age of AI There is a lot written about technology’s threats to democracy. Polarization. Artificial intelligence. The concentration of wealth and power. I have a more general story: The political and economic systems of governance that were created in the mid-18th century are poorly suited for the 21st century. They don’t…

Read More

CCSP certification Certified Cloud Security Professional (CCSP) is a cloud-focused security certification for experienced security pros responsible for applying best practices to cloud security architecture and design. CCSP is offered by the International Information System Security Certification Consortium (ISC2), a nonprofit focused on training and certifying cybersecurity professionals. CCSP was rolled out at RSA in…

Read More

Jun 18, 2024NewsroomVulnerability / Cryptojacking Cybersecurity researchers have uncovered a new malware campaign that targets publicly exposed Docket API endpoints with the aim of delivering cryptocurrency miners and other payloads. Included among the tools deployed is a remote access tool that’s capable of downloading and executing more malicious programs as well as a utility to…

Read More

Data breaches become more likely when attackers capture abandoned files, including personal information, financial records, or confidential business data, Vibert says. “These forgotten or unmanaged pieces of data often lack strong protection, making them attractive targets.” Furthermore, stale data can equip cybercriminals with valuable historical information, enabling them to craft more convincing phishing emails or…

Read More

How to Recover from Ransomware Attack Incidents: What You Need to Know No business wants to fall victim to a ransomware attack. But in the event that last lines of defense do fail, it’s vital that companies have the right processes and technologies on hand to recover from any downtime, secure their systems from infection…

Read More

A US court has found a Nigerian national guilty of charges related to a US $1.5 million business email compromise (BEC) scam and could face the rest of his life in prison as a consequence. 35-year-old Ebuka Raphael Umeti was convicted last week by a federal jury in Alexandria, Virginia, for operating a scheme that…

Read More

Jun 18, 2024NewsroomNetwork Security / Vulnerability VMware has released updates to address critical flaws impacting Cloud Foundation, vCenter Server, and vSphere ESXi that could be exploited to achieve privilege escalation and remote code execution. The list of vulnerabilities is as follows – CVE-2024-37079 & CVE-2024-37080 (CVSS scores: 9.8) – Multiple heap-overflow vulnerabilities in the implementation…

Read More

Jun 18, 2024NewsroomMobile Security / Financial Fraud The Singapore Police Force (SPF) has announced the extradition of two men from Malaysia for their alleged involvement in a mobile malware campaign targeting citizens in the country since June 2023. The unnamed individuals, aged 26 and 47, engaged in scams that tricked unsuspecting users into downloading malicious…

Read More

Business Security Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack 17 Jun 2024  •  , 3 min. read We watch real life attacks in horror, where companies simply try to defend against attackers stomping on their networks in real time, blunting the…

Read More

Virtusa, Redapt, Network Doctor, Microsoft, Amazon Web Services and Atlassian are among the companies to list open positions for channel-related roles. This month, Virtusa, Redapt and Network Doctor are among the solution providers to list open positions while Microsoft, Amazon Web Services and Atlassian are among the vendors to list open positions for channel-related roles.…

Read More