Tag: News
-
Hackers try to exploit WordPress plugin vulnerability that’s as severe as it gets
Hackers are assailing websites using a prominent WordPress plugin with millions of attempts to exploit a high-severity vulnerability that …
-
Impact of organizational structure on ransomware outcomes: Where does your org fit in?
How is your security team organized, and does it affect the quality of cybersecurity outcomes? If a recent report from cybersecurity firm …
-
Kaiser Permanente handed over 13.4M people’s data to Microsoft, Google, others
Millions of Kaiser Permanente patients’ data was likely handed over to Google, Microsoft Bing, X/Twitter, and other third-parties, …
-
Hackers make millions of attempts to exploit WordPress plugin vulnerability
Hackers are assailing websites using a prominent WordPress plugin with millions of attempts to exploit a high-severity vulnerability that …
-
Cybersecurity provider Darktrace to be acquired by Thoma Bravo for $5.3B
The all-cash deal values Darktrace at $7.75 per share, a 20% premium over its last unaffected stock price. Thoma Bravo says KKR and other …
-
Kaiser Permanente shared 13.4M people’s data with Microsoft Bing, Google, others
Millions of Kaiser Permanente patients’ data was likely shared with Google, Microsoft Bing, X/Twitter, and other third-parties, according …
-
Second time lucky for Thoma Bravo, which scoops up Darktrace for $5.3B
Private equity investor Thoma Bravo has successfully completed a second acquisition attempt of UK-based cybersecurity company Darktrace in …
-
AI sparks increasing cyber concerns for execs amid growing adoption
Twenty percent of cybersecurity officers across the UK cited artificial intelligence as their organizations’ most significant cybersecurity …
-
More details on rural water system breach sought by legislators
U.S. Department of Homeland Security Secretary Alejandro Mayorkas was urged by …
-
Infections with abandoned PlugX USB worm continue to be prevalent
Millions of devices could still be compromised by the abandoned PlugX USB worm with self-replicating functionality, with infections logged …
-
Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing
By Alex Serdiuk, CEO, Respeecher Newer and more impactful technological advancements are making the quest for foolproof cybersecurity …
-
Five ways security leaders can demonstrate the business value of cybersecurity
The U.S. Office of the National Cyber Director has been urged by the Government Accountability Office to strengthen the implementation of …
●●●