Security firm Rubrik is latest to be felled by GoAnywhere vulnerability

Recently, news broke that security firm Rubrik had become the latest victim of the ‘GoAnywhere’ vulnerability. The security firm, which provides data protection and management solutions, has experienced a massive data breach due to the vulnerability. This comes on the heels of similar breaches that have occurred for organizations using GoAnywhere, a managed file transfer… Continue reading Security firm Rubrik is latest to be felled by GoAnywhere vulnerability

Female check-writers alone aren’t enough to close the female fundraising gap, data shows

When discussing the fundraising gap between male and female philanthropists, many people point to the number of female check-writers as the primary concern. However, a new study shows that having more female check-writers is not enough to close the fundraising gap. The study, conducted by Women Give 2020, looked at female giving in the United… Continue reading Female check-writers alone aren’t enough to close the female fundraising gap, data shows

LGBTQ organizations report a recent uptick in Twitter hate

LGBTQ organizations have recently reported an increase in the amount of hate on the social media platform, Twitter. These reports have seen a steady uptick since the start of 2019, with reports of hate speech, cyberbullying, and targeted harassment against queer individuals, in particular, rising. The issue of online hate has been a contentious one… Continue reading LGBTQ organizations report a recent uptick in Twitter hate

How to manage third-party cybersecurity risks that are too costly to ignore

As businesses become increasingly dependent on technology, they are often left vulnerable to security issues due to the growing reliance on third-party applications and services. With cyberattacks on the rise, organizations must take steps to protect themselves and manage the associated risks that come with third-party cybersecurity. First, organizations must assess their situation and understand… Continue reading How to manage third-party cybersecurity risks that are too costly to ignore

Hacker group incorporates DNS hijacking into its malicious website campaign

Hacker groups have become increasingly sophisticated when it comes to their malicious activities. According to recent reports, one such group is now incorporating DNS hijacking into its campaigns – a dangerous cyberattack technique that can expose individuals and organizations to serious information security risks. DNS hijacking is a type of cyberattack in which a hacker… Continue reading Hacker group incorporates DNS hijacking into its malicious website campaign

Vulnerability with 9.8 severity in Control Web Panel is under active exploit

Security experts recently alerted organizations of a serious vulnerability with a 9.8 severity rating associated with control web panels. According to reports, the vulnerability, tracked as CVE-2020-0001, has been actively exploited in the wild. The vulnerability discloses a remote code execution (RCE) weakness in an affected control web panel application. Hackers have been exploiting it… Continue reading Vulnerability with 9.8 severity in Control Web Panel is under active exploit

This 45 year-old Unix tool is finally getting an upgrade

For over four decades, Unix has been a sophisticated tool used by tech experts around the world. The operating system first developed in the 1970s is now getting a major upgrade. This 45-year-old technology, largely unchanged in its long history, is being brought up to date with modernization and optimization. Companies are taking advantage of… Continue reading This 45 year-old Unix tool is finally getting an upgrade

Microsoft digital certificates have once again been abused to sign malware

On October 14th, 2020, malicious actors once again took advantage of Microsoft digital certificates to sign dangerous malware. According to security research firm Morphisec, the attackers abused trusted certificates issued by Microsoft to sign malware in order to circumvent security measures. The malicious code was signed with a certificate issued by Microsoft Office and the… Continue reading Microsoft digital certificates have once again been abused to sign malware

Protect lands

The tech world has been abuzz with news of a major investment in Protect AI – a San Francisco based startup that offers a cybersecurity solution for Artificial Intelligence (AI) projects. Last month, the company announced it had secured $13.5 million in series A funding to continue developing tools that help protect AI projects from… Continue reading Protect lands

All signs point to IT spending rising in 2023

Every year, businesses factor IT spending into their operational budgets; however, projections for 2023 indicate that IT spending is likely to rise considerably. The precise amounts may vary from organization to organization, but the overall trend is one of increased investment in technology, software, and services across the board. The unprecedented events of 2020 have… Continue reading All signs point to IT spending rising in 2023

Exit mobile version