Please turn on your JavaScript for this page to function normally.
Joseph Sweeney
Leveraging AI for enhanced compliance and governance

In this Help Net Security interview, Dr. Joseph Sweeney, Advisor at IBRS, discusses the risks of integrating AI into information management systems. He talks about emerging …

Graylog
Graylog: Open-source log management

Graylog is an open-source solution with centralized log management capabilities. It enables teams to collect, store, and analyze data to get answers to security, application, …

expose personal information
37% of publicly shared files expose personal information

Many sensitive documents stored on platforms such as Google Drive, Slack, and other collaborative work applications have been left unattended for several months or even years. …

Microsoft SharePoint
New covert SharePoint data exfiltration techniques revealed

Varonis Threat Labs researchers have uncovered two techniques attackers can use can use for covert data and file exfiltration from companies’ SharePoint server. …

bomb
IT pros targeted with malicious Google ads for PuTTY, FileZilla

An ongoing malvertising campaign is targeting IT administrators looking to download system utilities such as PuTTY (a free SSH and Telnet client) and FileZilla (a free …

handshake
Why are many businesses turning to third-party security partners?

In 2023, 71% of organizations across various industries reported that their business feels the impact of the ongoing cybersecurity skills shortage. Many companies have been …

Sean Doyle
WEF Cybercrime Atlas: Researchers are creating new insights to fight cybercrime

In early 2023, the World Economic Forum (WEF) launched Cybercrime Atlas, with the intent to map the cybercriminal ecosystem by facilitating collaboration between private and …

cybersecurity jobs
Cybersecurity jobs available right now: April 10, 2024

Some of the jobs listed here are no longer accepting applications. For a fresh list of open cybersecurity jobs, go here: Cybersecurity jobs available right now: April 17, 2024 …

GSMA
GSMA releases Mobile Threat Intelligence Framework

GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile …

Patch Tuesday
Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)

On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked …

LG webOS TV
LG smart TVs may be taken over by remote attackers

Bitdefender researchers have uncovered four vulnerabilities in webOS, the operating system running on LG smart TVs, which may offer attackers unrestricted (root) access to the …

Google Workspace
New Google Workspace feature prevents sensitive security changes if two admins don’t approve them

Google is rolling out multi-party approvals for Google Workspace customers with multiple super admin accounts, the company has announced. What does the feature do? Google …

Don't miss

Cybersecurity news