New SEC Rules for Cyber Attack Disclosure The U.S. Securities and Exchange Commission (SEC) has approved new rules that mandate…
Browsing: Threats and Vulnerabilities
Security researchers from Midnight Blue, a Netherlands-based security firm, have discovered five vulnerabilities in the Terrestrial Trunked Radio (TETRA) communication…
Ah, summer vacation. Something we almost all look forward to each year – a time to relax and reset. It’s…
One of the most pressing concerns in the digital age is the abundance of cyber threats from all directions, with…
Whilst the conceptual and academic discussions around dangerous forms of code have been on the agenda for many decades past,…
Executive Summary In today’s complex and volatile business environment, Enterprise Risk Management (ERM) has become a strategic imperative. This article…
Historically, the financial services sector has been the most attacked by cybercriminals. Still, in 2021 there was a substantial shift,…
It’s no secret that penetration testing is among the most effective methodologies for helping determine an organization’s risk posture. While…
In the first quarter of 2023, the Trellix Advanced Research Center (ARC) has unveiled a comprehensive CyberThreat Report, delivering crucial…
In a bid to protect its users, Apple has rolled out an important update, iOS 16.5.1, along with macOS 13.4.1,…