CISA announces secure by design pledges from leading tech providers Security Staff May 17, 2024 The CISA announced that 68 leading software manufacturers voluntarily committed to CISA’s Secure by Design pledge.Read More
59% of organizations faced a software supply chain attack Security Staff May 16, 2024 59% of organizations experienced a software supply chain attack, with 54% of these respondents having experienced one in the past year. Read More
Meta is the second most spoofed brand for credential phishing Security Staff May 15, 2024 A sophisticated phishing campaign is bypassing multi-factor authentication in order to target Meta business accounts. Read More
Malware was almost 50% of threat detections in Q1 2024 Security Staff May 15, 2024 According to a cybersecurity and threat intelligence report, the U.S. was the 4th most targeted country in the world regarding phishing attacks. Read More
72% of consumers worry daily about being fooled by a deepfake Security Staff May 14, 2024 A global consumer research study reveals consumer attitudes about generative AI, showing that many are concerned about being fooled by deepfakes. Read More
FTC orders Cerebral to restrict how consumer data can be shared Security Staff May 13, 2024 The Federal Trade Commission (FTC) has ordered Cerebral, Inc. to restrict how the company can use and/or disclose sensitive consumer data.Read More
25% of CISOs in tech are not satisfied with their compensation Security Staff May 10, 2024 A report detailing tech CISO compensation, mobility and job position satisfaction shows that a quarter of CISOs are unhappy with their compensation. Read More
97% of organizations report difficulties with identity verification Security Staff May 9, 2024 A survey of 700 IT decision-makers reveals the state of identity fraud. Notably, almost all organizations face challenges with identity verification. Read More
“Selfie spoofing” scams are growing in popularity Security Staff May 8, 2024 There has been an increase in “selfie spoofing” scams, or scams in which a fraud actor takes a target’s selfie in order to authenticate a stolen identity and open fraudulent accounts.Read More
Global News Vulnerability exploitation on the rise Taelor Sutherland May 8, 2024 The most commonly exploited vulnerabilities.Read More