Millions of Budget Smartphones With UNISOC Chips Vulnerable to Remote DoS Attacks

Millions of budget smartphones that use UNISOC chipsets could have their communications remotely disrupted by hackers due to a critical vulnerability discovered recently by researchers at cybersecurity firm Check Point.
read more

Continue reading Millions of Budget Smartphones With UNISOC Chips Vulnerable to Remote DoS Attacks

Implementing wireless security in the enterprise [TechTarget Interview]

Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes. Download a free excerpt from the book.

MORE > Click the title to read the full article.

Continue reading Implementing wireless security in the enterprise [TechTarget Interview]

Microsoft Finds Major Security Flaws in Pre-Installed Android Apps

Bug hunters at Microsoft are calling attention to several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps, warning that exploitation could have allowed the implantation of a persistent backdoor on Android d… Continue reading Microsoft Finds Major Security Flaws in Pre-Installed Android Apps

Researchers Devise New Type of Bluetooth LE Relay Attacks

Security researchers at NCC Group have created a new tool capable of launching a new type of Bluetooth Low Energy (BLE) relay attack that bypasses existing protections and mitigations.
read more

Continue reading Researchers Devise New Type of Bluetooth LE Relay Attacks

BalkanID Raises $6M for Intelligent IGA Technology

BalkanID, a startup with ambitious plans to disrupt the Identity Governance and Administration (IGA) space, has banked $5.75 million in seed funding to help organizations find and remediate risky privileges across SaaS and public cloud infrastructure.
Continue reading BalkanID Raises $6M for Intelligent IGA Technology

GitHub Announces Mandatory 2FA for Code Contributors

Code hosting platform GitHub on Wednesday said it would make it mandatory for software developers to use at least one form of two-factor authentication (2FA) by the end of 2023.
read more

Continue reading GitHub Announces Mandatory 2FA for Code Contributors

Cyberespionage Group Targeting M&A, Corporate Transactions Personnel

Security researchers at Mandiant are documenting the discovery of a new hacking group focused on cyberespionage targeting employees responsible for corporate development, large corporate transactions, and mergers and acquisitions.
read more

Continue reading Cyberespionage Group Targeting M&A, Corporate Transactions Personnel