Cyber Technology
- Cyber Security
Iran-Backed Actor Behind ‘Holy Souls’ Cyberattack on Charlie Hebdo, Microsoft Says
A recent attack where a threat group calling itself “Holy Souls” accessed a database belonging to satirical French magazine Charlie…
Read More » - Cyber Security
How the Cloud Is Shifting CISO Priorities
The challenges facing chief information security officers (CISOs) have evolved dramatically in the past decade. Today, they must align their security…
Read More » - Cyber Security
Korelock Launches IOT Smart Lock Technology Company
DENVER, Feb. 2, 2023 /PRNewswire/ — KoreLock, an emerging IoT Smart Lock technology company, is pleased to announce funding to support the development…
Read More » - Cyber Security
Study: Companies have upwards of 1,000 apps but only a third are integrated
Image: WrightStudio/Adobe Stock Tech market observers predict organizations will increase IT spending this year, driven in part by digital transformation.…
Read More » - Cyber Security
Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter
A critical security vulnerability in QNAP’s QTS operating system for network-attached storage (NAS) devices could allow cyberattackers to inject malicious…
Read More » - Cyber Security
AppSec Playbook 2023: Study of 829M Attacks on 1,400 Websites
Indusface’s research on 1,400+ Web apps, mobile apps, and APIs revealed that open vulnerabilities remain cybercriminals’ most significant attack vector.…
Read More » - Cyber Security
Managing the Governance Model for Software Development in a No-Code Ecosystem
The no-code approach has changed the nature of software development. However, if you’re in IT, the idea of no-code apps…
Read More » - Cyber Security
Lazarus Group Rises Again, to Gather Intelligence on Energy, Healthcare Firms
Security researchers on Feb. 2 reported that they have detected a cyberattack campaign by the North Korean Lazarus Group, targeting…
Read More » - Cyber Security
Nearly All Firms Have Ties With Breached Third Parties
Nearly every company does business with — or uses the products of — a third party that has suffered a…
Read More » - Cyber Security
OneNote documents spread malware in several countries
A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K.,…
Read More »