New cybersecurity tech treats keys like the Colonel’s secret recipe

Cybersecurity is a growing concern as more and more critical infrastructure can be exposed to hacks through the internet. Now, Australian engineers have developed and demonstrated a new technique called “ineffable cryptography,” which treats keys like … Continue reading New cybersecurity tech treats keys like the Colonel’s secret recipe

Danish energy sector hit by a wave of coordinated cyberattacks

The Danish energy sector has suffered what is believed to be the most extensive cyberattack in Danish history, according to SektorCERT. Danish energy sector under attack SektorCERT, an organization owned and funded by Danish critical infrastructure (CI… Continue reading Danish energy sector hit by a wave of coordinated cyberattacks

Mandiant Tracks Four Uncategorized Groups Exploiting Citrix Vulnerability

By Waqas
Mandiant Investigates Zero-Day Exploitation in Citrix Vulnerability, CVE-2023-4966.
This is a post from HackRead.com Read the original post: Mandiant Tracks Four Uncategorized Groups Exploiting Citrix Vulnerability
Continue reading Mandiant Tracks Four Uncategorized Groups Exploiting Citrix Vulnerability

Cyberattacks on healthcare organizations affect patient care

88% of organizations experienced an average of 40 attacks in the past 12 months, according to a survey conducted by the Proofpoint and Ponemon Institute. Supply chain attacks: Leading patient care risk The average total cost of a cyberattack experience… Continue reading Cyberattacks on healthcare organizations affect patient care

CISOs and board members are finding a common language

86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and freeing up security professionals to be more strategic, according to Splunk. 35% … Continue reading CISOs and board members are finding a common language

Inadequate IoT protection can be a costly mistake

97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations experienced certificate outages in the last 12 months, costing an average of… Continue reading Inadequate IoT protection can be a costly mistake

Selective disclosure in the identity wallet: How users share the data that is really needed

Name, date of birth, address, email address, passwords, tax records, or payroll – all this sensitive user data is stored by companies in huge databases to identify individuals for digital services. Although companies have long applied limits to employe… Continue reading Selective disclosure in the identity wallet: How users share the data that is really needed

Are executives adequately guarding their gadgets?

Today, individual citizens, rather than businesses or governmental bodies, are the main entry points for cyberattacks. However, security solutions haven’t evolved sufficiently to guard public figures and leaders as they do for large corporate ent… Continue reading Are executives adequately guarding their gadgets?