Exploring the root causes of the cybersecurity skills gap
In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the need for diverse talent and…
Operational Security | Cybersecurity & more!
In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the need for diverse talent and…
Keywords/Tags: Data Breaches, Mobile & Wireless, Nation-State, Android, China, CSRB, iPhone, Microsoft Article Source: SecurityWeek Starting in September, Microsoft will mandate the the use of Apple’s iPhones to authenticate identities…
TeamViewer, the company developing the popular remote access/control software with the same name, has finished the investigation into the breach it detected in late June 2024, and has confirmed that…
Keywords/Tags: Cyberwarfare, China, Featured, NATO, Russia Article Source: SecurityWeek On the eve of NATO’s 75th anniversary summit in Washington DC, Mandiant outlines the current state of cyberthreats facing NATO and…
Keywords/Tags: Data Breaches, Phishing, cryptocurrency, cryptomining, Ethereum Article Source: SecurityWeek A threat actor sent over 35,000 phishing emails after hacking into Ethereum Foundation’s account on a mailing list platform. The…
Keywords/Tags: Cloud Security, Cyberwarfare, Nation-State, CloudSorcerer, Kaspersky, Russia, sanctions Article Source: SecurityWeek Kaspersky said the CloudSorcerer APT has been abusing public cloud services to exfiltrate data from Russian government entities.…
Keywords/Tags: Government, Featured, Regulations Article Source: SecurityWeek The Supreme Court’s striking down of the Chevron Doctrine will have a major effect on the determination and enforcement of cyber regulation in…
Keywords/Tags: Data Breaches, data breach, lawsuit Article Source: SecurityWeek A class action lawsuit was filed against Geisinger for failing to properly secure patients’ personal and health information. The post Former…
Keywords/Tags: Vulnerabilities, CVE-2024-29510, vulnerability Article Source: SecurityWeek Vulnerability in Ghostscript (CVE-2024-29510) allows attackers to bypass sandbox for remote code execution. The post Attackers Exploiting Remote Code Execution Vulnerability in Ghostscript…
Keywords/Tags: Cloud Security, cloud, ZTNA Article Source: SecurityWeek With Living Off the Cloud (LOTC) attacks, hackers abuse APIs of trusted cloud services to remotely control botnets but also to make…