Moving from a state of indifference about security to a place where users actively champion it can be transformed through a focused effort.
The post How to Fix a Dysfunctional Security Culture appeared first on SecurityWeek.
Moving from a state of indifference about security to a place where users actively champion it can be transformed through a focused effort.
The post How to Fix a Dysfunctional Security Culture appeared first on SecurityWeek.
Starting in September, Microsoft will mandate the the use of Apple’s iPhones to authenticate identities when logging into work machines.
The post Microsoft Banning Android Phones for Staff in China appeared first on SecurityWeek.
On the eve of NATO’s 75th anniversary summit in Washington DC, Mandiant outlines the current state of cyberthreats facing NATO and aligned countries.
The post Mandiant Highlights Russian and Chinese Cyber Threats to NATO on Eve of 75th Anniversary Summit appeared first on SecurityWeek.
A threat actor sent over 35,000 phishing emails after hacking into Ethereum Foundation’s account on a mailing list platform.
The post Hacked Ethereum Foundation Account Used to Send 35,000 Phishing Emails appeared first on SecurityWeek.
Kaspersky said the CloudSorcerer APT has been abusing public cloud services to exfiltrate data from Russian government entities.
The post Kaspersky Flags Cyberespionage APT ‘CloudSorcerer’ Targeting Russian Government appeared first on SecurityWeek.
The Supreme Court’s striking down of the Chevron Doctrine will have a major effect on the determination and enforcement of cyber regulation in the US.
The post Supreme Court Ruling Threatens the Framework of Cybersecurity Regulation appeared first on SecurityWeek.
A class action lawsuit was filed against Geisinger for failing to properly secure patients’ personal and health information.
The post Former Nuance Employee Arrested After Geisinger Data Breach Exposed 1.2 Million Records appeared first on SecurityWeek.
Vulnerability in Ghostscript (CVE-2024-29510) allows attackers to bypass sandbox for remote code execution.
The post Attackers Exploiting Remote Code Execution Vulnerability in Ghostscript appeared first on SecurityWeek.
With Living Off the Cloud (LOTC) attacks, hackers abuse APIs of trusted cloud services to remotely control botnets but also to make malicious traffic appear as trusted cloud traffic.
The post Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them appeared first on SecurityWeek.
Baptiste Robert, a French cybersecurity expert, called on his government – and especially lawmakers – to prepare for the digital threats to come.
The post Russian-Linked Cybercampaigns put a Bull’s-Eye on France. Their Focus? The Olympics and Elections appeared first on SecurityWeek.