Tag: cybersecurity

Here you will find all the articles with the tag: cybersecurity.

‘Google’s incognito mode is not really incognito’

‘Google’s incognito mode is not really incognito’

According to a Texan lawsuit, Google deceptively collects an array of personal data when a user has engaged in incognito mode. In January, Washington State, Indiana, Texas, and the state of Columbia filed separate suits against Google over deceptive location tracking and invasion of user privacy... Read more

date22 hours ago
Tanium introduces free risk assessment

Tanium introduces free risk assessment

The free service determines whether an organization is resilient to vulnerabilities and attacks. Tanium develops endpoint security software. Its platform maps all endpoints in an environment, including devices, containers and servers. Several tools recognize and remove suspicious users, vulnerab... Read more

date22 hours ago
CISA issues warning about VMware and F5 vulnerabilities

CISA issues warning about VMware and F5 vulnerabilities

The threats could impact a large number of companies, the agency says. The U.S. Cybersecurity and Infrastructure Security Agency has issued alerts about five software vulnerabilities that likely affect a large number of organizations. Four of the vulnerabilities were found in VMware Inc. prod... Read more

date4 days ago
Thales acquires two cybersecurity companies

Thales acquires two cybersecurity companies

Thales announced that it had reached an agreement with Sonae Investment Management to buy two European cybersecurity firms, S21sec and Excellium, for 120 million euros ($125.32 million). In a statement, Europe's largest armaments electronics company, which also develops civil aviation components... Read more

date5 days ago
Critical authentication bypass flaw in multiple VMware products

Critical authentication bypass flaw in multiple VMware products

VMware urges customers to immediately patch a critical authentication bypass flaw affecting multiple products. Two vulnerabilities allows attackers with backdoor access to gain admin privileges on multiple VMware products -- and that's not a good thing.  Bruno Lopez of Innotec Security w... Read more

date5 days ago
How do you interpret the results of MITRE ATT&CK evaluations?

How do you interpret the results of MITRE ATT&CK evaluations?

Not all detections are created equal. Keep that in mind when choosing cybersecurity tools. The cybersecurity market is very fragmented. Organizations looking to improve their security posture have a tremendously wide range of solutions to choose from. This ensures that there are many offerings f... Read more

date5 days ago
Research: new tools and security measures often counterproductive

Research: new tools and security measures often counterproductive

Research by Zivver reveals that although companies have accelerated their innovation efforts in the past two years, many challenges remain. Employees that participated in the study complain about security measures that are counterproductive and slow down work. Many applications have been added in t... Read more

date5 days ago
Nasuni introduces ransomware protection for file data

Nasuni introduces ransomware protection for file data

Nasuni recently introduced Nasuni Ransomware Protection. The solution protects unstructured file data against ransomware attacks. Nasuni wants to better protect unstructured data against the risks of ransomware attacks. Nasuni Ransomware Protection provides 'inline' ransomware edge detection fun... Read more

date6 days ago
EU believes Open RAN could improve 5G security concerns

EU believes Open RAN could improve 5G security concerns

EU believes Open RAN technology could have long-term benefits related to the continent's cybersecurity, but there are also potential short-term risks. European Union (EU) has reported that Open RAN technology can improve the cybersecurity of the continent. However, they also warned that there mi... Read more

date6 days ago
1 2 3 42