CDK Global hacked again while recovering from first cyberattack
Car dealership SaaS platform CDK Global suffered an additional breach Wednesday night as it was starting to restore...
Download the cloud security posture management (CSPM) buyer’s guide
From the editors of our sister publication CSO, this enterprise buyer’s guide helps network and security IT staff...
CompTIA updates Network+ certification
CompTIA today introduced an updated edition of its Network+ professional certification, which the nonprofit organization says will enable...
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Cybersecurity researchers have disclosed details of a now-patched security flaw in Phoenix SecureCore UEFI firmware that affects multiple...
French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks
State-sponsored actors with ties to Russia have been linked to targeted cyber attacks aimed at French diplomatic entities,...
Patrick Finn: why I joined Cloudflare as VP Sales for the Americas
I’m delighted to be joining Cloudflare as Vice President of Sales in the US, Canada, and Latin America....
Introducing Stream Generated Captions, powered by Workers AI
With one click, customers can now generate video captions effortlessly using Stream’s newest feature: AI-generated captions for on-demand...
Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024
Highlights Complex Tool Landscape: Explore the wide array of cybersecurity tools used by MSPs, highlighting the common challenge...
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom...
Booking.com warns of up to 900% increase in travel scams
The online travel firm says generative AI tools, such as ChatGPT, are driving the explosive rise. Source:: BBC...
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains...
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese...
How AWS secures its infrastructure with Sonaris
AWS is using its public cloud infrastructure as a globe-spanning threat detection tool to protect customers from trillions...
HPE-Juniper merger faces antitrust inquiry in UK
An inquiry into HPE’s $14 billion takeover of Juniper Networks by the UK’s Competition and Markets Authority (CMA),...
T-Mobile denies it was hacked, links leaked data to vendor breach
T-Mobile has denied it was breached or that source code was stolen after a threat actor claimed to...
Crown Equipment confirms a cyberattack disrupted manufacturing
Forklift manufacturer Crown Equipment confirmed today that it suffered a cyberattack earlier this month that disrupted manufacturing at...
Advance Auto Parts confirms data breach exposed employee information
Advance Auto Parts has confirmed it suffered a data breach after a threat actor attempted to sell stolen...
Amazon OpenSearch Service now supports JSON Web Token (JWT) authentication and authorization
Amazon OpenSearch Service now supports JSON Web Token (JWT) that enables you to authenticate and authorize users without...
CDK Global cyberattack impacts thousands of US car dealerships
Car dealership software-as-a-service provider CDK Global was hit by a massive cyberattack, causing the company to shut down...
Amazon CodeCatalyst now supports GitHub Cloud and Bitbucket Cloud with Amazon Q
Amazon CodeCatalyst now supports the use of source code repositories hosted in GitHub Cloud and Bitbucket Cloud with...