‘Google’s incognito mode is not really incognito’
According to a Texan lawsuit, Google deceptively collects an array of personal data when a user has engaged in incognito mode.
In January, Washington State, Indiana, Texas, and the state of Columbia filed separate suits against Google over deceptive location tracking and invasion of user privacy... Read more
Tanium introduces free risk assessment
The free service determines whether an organization is resilient to vulnerabilities and attacks.
Tanium develops endpoint security software. Its platform maps all endpoints in an environment, including devices, containers and servers. Several tools recognize and remove suspicious users, vulnerab... Read more
CISA issues warning about VMware and F5 vulnerabilities
The threats could impact a large number of companies, the agency says.
The U.S. Cybersecurity and Infrastructure Security Agency has issued alerts about five software vulnerabilities that likely affect a large number of organizations.
Four of the vulnerabilities were found in VMware Inc. prod... Read more
Thales acquires two cybersecurity companies
Thales announced that it had reached an agreement with Sonae Investment Management to buy two European cybersecurity firms, S21sec and Excellium, for 120 million euros ($125.32 million).
In a statement, Europe's largest armaments electronics company, which also develops civil aviation components... Read more
Critical authentication bypass flaw in multiple VMware products
VMware urges customers to immediately patch a critical authentication bypass flaw affecting multiple products.
Two vulnerabilities allows attackers with backdoor access to gain admin privileges on multiple VMware products -- and that's not a good thing.
Bruno Lopez of Innotec Security w... Read more
How do you interpret the results of MITRE ATT&CK evaluations?
Not all detections are created equal. Keep that in mind when choosing cybersecurity tools.
The cybersecurity market is very fragmented. Organizations looking to improve their security posture have a tremendously wide range of solutions to choose from. This ensures that there are many offerings f... Read more
Research: new tools and security measures often counterproductive
Research by Zivver reveals that although companies have accelerated their innovation efforts in the past two years, many challenges remain. Employees that participated in the study complain about security measures that are counterproductive and slow down work. Many applications have been added in t... Read more
Use of malicious PHP code by hackers leads to stolen credit card data
Te FBI states that unidentified hackers created a backdoor into a victim’s system and accessed their credit card data.
The FBI has issued a warning stating that unidentified individuals have been scraping credit card data from the checkout pages of US websites and E-commerce business owners ar... Read more
Nasuni introduces ransomware protection for file data
Nasuni recently introduced Nasuni Ransomware Protection. The solution protects unstructured file data against ransomware attacks.
Nasuni wants to better protect unstructured data against the risks of ransomware attacks. Nasuni Ransomware Protection provides 'inline' ransomware edge detection fun... Read more
EU believes Open RAN could improve 5G security concerns
EU believes Open RAN technology could have long-term benefits related to the continent's cybersecurity, but there are also potential short-term risks.
European Union (EU) has reported that Open RAN technology can improve the cybersecurity of the continent. However, they also warned that there mi... Read more