Apple pushed out an emergency security update for two critical zero-day flaws that attackers are using to carry out memory corruption attacks on iPhone and iPad devices. The tech giant's latest patch addressed its third zero-day vulnerability this year.
The European Parliament and the council of direct European national governments reached a political agreement Tuesday on a proposal that seeks to improve trading bloc cybersecurity. The Cyber Solidary Act will create a "cybersecurity shield" consisting of cross-border security operations centers.
Cloudflare's acquisition of Nefeli Networks aims to streamline multi-cloud networking by offering seamless integration and security across cloud platforms. The move simplifies cloud connectivity by providing a unified platform for businesses to manage their network and security policies efficiently.
In today's digital age, new career opportunities have emerged for digital protectors, and they are not subject to business budgetary trends. For those willing to dedicate their lives to safeguarding the digital corridors we all traverse, the rewards are both tangible and profound.
As the fallout continues in the Change Healthcare IT outage, the U.S. healthcare ecosystem is anticipating the next bombs to drop in what's shaping up to be the worst cyberattack the sector has experienced so far. What should entities be considering as they push forward in the recovery?
Hornetsecurity purchased French email security vendor Vade to expand its geographic footprint and protection capabilities around Microsoft 365 for small and midsized businesses. The acquisition of Vade will allow the joint company to have a strong presence in Europe's two most important markets.
German Minister of Defense Boris Pistorius on Tuesday said the recent leak of intercepted military data was the result of an "application error" and not caused by a system compromise by Russian hackers. Pistorius also said the country is continuing to examine the incident further.
The administrators of the BlackCat ransomware-as-a-service group claim law enforcement has shut down their operation. But experts and affiliates accuse the group's leadership of running an exit scam on the heels of a $22 million ransom payment by a recent victim - Optum's Change Healthcare unit.
The healthcare sector should have plenty of experience responding to data security incidents and breaches, especially in light of the record number of breaches reported last year. But when leaders are dealing with an incident, response plans can go awry. Experts offer tips for avoiding mishaps.
Researchers have created a zero-click, self-spreading worm that can steal personal data through applications that use chatbots powered by generative artificial intelligence. Dubbed Morris II, the malware uses a prompt injection attack vector to trick AI-powered email assistant apps.
Two critical vulnerabilities affecting all on-premises versions of TeamCity servers can result in authentication bypass and path traversal, enabling an attacker to gain administrative privileges for a server and take it over. Users should prioritize patching now that the exploit is public.
A cyber threat actor is shifting tactics from conventional malware delivery to a targeted focus on acquiring NT LAN Manager authentication information to potentially collect sensitive data and perform other malicious actions. The campaigns have targeted hundreds of organizations globally.
Privacy groups are urging European lawmakers finalizing the global treaty on artificial intelligence to tighten rules surrounding the use of AI by the private sector and states. Lawmakers and other country representatives are set to meet for final negotiations on the treaty on March 11.
Two weeks into a major cyberattack-induced outage at its Change Healthcare business, UnitedHealth Group is offering short-term financial aid to some healthcare providers whose cash flows may be running short because of the disruption in insurance payments. But not everyone is impressed.
The rapid rise of artificial intelligence technologies poses new risks. Enterprises using AI must regularly scan for prompt injection attacks, implement transparency in the supply chain and reinforce built-in software controls to serve their company's security needs, Microsoft said.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.