Zephyrnet Logo

Tag: CISA

Third Ivanti Vulnerability Exploited in the Wild, CISA Reports

A critical vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2023-35082, has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog.The vulnerability has...

Lock Down the Software Supply Chain With ‘Secure by Design’

Software that prioritizes security at its most foundational level means designing the system with customer security as a key goal rather than a tacked-on...

LoanDepot latest real estate company to be hit by hackers

The verdict is in — the old way of doing business is over. Join us at Inman Connect New York Jan. 23-25, when together...

Zeppelin Ransomware Source Code & Builder Sells for $500 on Dark Web

A threat actor has sold for just $500 the source code and a cracked builder for Zeppelin, a Russian ransomware strain used in numerous...

In Cybersecurity and Fashion, What’s Old Is New Again

COMMENTARYWhile distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity, they're still happening regularly for a simple reason: They work. In...

Skynet Ahoy? What to Expect for Next-Gen AI Security Risks

As innovation in artificial intelligence (AI) continues apace, 2024 will be a crucial time for organizations and governing bodies to establish security standards, protocols, and...

5 Tips for SMEs to Stay Cyber Safe This Festive Season

The festive season should be a time for celebration and relaxation. Instead, small and mid-sized enterprises (SMEs) must prepare for a sudden onslaught of...

How to bolster security against intellectual property theft

Intellectual property theft is a major concern for all businesses, but especially organizations in the defense-industrial base because their IP is vital to national...

Adapting to the Post-SolarWinds Era: Supply Chain Security in 2024

COMMENTARYIn December 2020, the SolarWinds attack sent shockwaves around the world. Attackers gained unauthorized access to SolarWinds' software development environment, injected malicious code into...

Latest Intelligence

spot_img
spot_img