Flexible Structure of Zip Archives Exploited to Hide Malware Undetected

Flexible Structure of Zip Archives Exploited to Hide Malware Undetected
Threat actors are exploiting the various ways that zip files combine multiple archives into one file as an anti-detection tactic ...
Read more

Cyber Threat by Google searching Bengal Cats legal in Australia

Cyber Threat by Google searching Bengal Cats legal in Australia
Cybersecurity experts at Sophos are warning Australian internet users about a growing cyber threat related to a specific search term: ...
Read more

How Developers Drive Security Professionals Crazy

How Developers Drive Security Professionals Crazy
COMMENTARY In the evolving landscape of software development, the integration of DevSecOps has emerged as a critical paradigm, promising a ...
Read more

CFPB Rule Changes Presents New Open Banking Challenge – Ensuring Compliance with API Standards

CFPB Rule Changes Presents New Open Banking Challenge – Ensuring Compliance with API Standards
Application programming interfaces (APIs) play a crucial role in modern business, particularly for banks, retailers, and global enterprises, by streamlining ...
Read more

Preparing for DORA Amidst Technical Controls Ambiguity 

Preparing for DORA Amidst Technical Controls Ambiguity 
COMMENTARY  January 2025 is a big month for the finance industry – and the clock is ticking. The Digital Operational ...
Read more

Fortinet Expands Generative AI Integration Across Cybersecurity Portfolio to Enhance Security Operations

Fortinet Expands Generative AI Integration Across Cybersecurity Portfolio to Enhance Security Operations
Fortinet® (NASDAQ: FTNT), a global leader in cybersecurity, has broadened its application of generative AI (GenAI) technology across its suite ...
Read more

Hackers Target Texas Oilfield Supplier With Ransomware

Hackers Target Texas Oilfield Supplier With Ransomware
Newpark Resources, a Texas-based oil drilling fluids system and composite matting systems provider, announced in a filing with the Securities ...
Read more

Meeting CISA’s Memory Safety Mandate: The Role of OT Software Buyers and Manufacturers

Meeting CISA’s Memory Safety Mandate: The Role of OT Software Buyers and Manufacturers
Over the past several years, CISA, the Cybersecurity and Infrastructure Security Agency, has released a steady stream of guidance encouraging ...
Read more

6 Infotainment Bugs Allow Mazdas to Be Hacked With USBs

6 Infotainment Bugs Allow Mazdas to Be Hacked With USBs
Six unpatched vulnerabilities in a Mazda in-vehicle infotainment (IVI) system could be exploited with a simple USB in a moments’ ...
Read more

American Oilfield supplier Newpark Resources hit by ransomware attack

Cyber Threat by Google searching Bengal Cats legal in Australia
Newpark Resources, a Texas-based company providing essential tools and services to the oil and gas industry, as well as the ...
Read more