Latest Posts › Cybersecurity

Share:

Security Snippets: Deepfake video being used for social engineering

Increasingly available Deepfake technology that can be used to impersonate employees is increasing the level of social engineering risk. Deepfake technology is increasingly being used against corporations to carry out social...more

Security Snippets: New Critical Jenkins Vulnerability

Vulnerability in the open-source automation server Jenkins is exploitable using a publicly released proof of concept. On January 24, 2024, Jenkins announced the presence of vulnerability CVE-2024-23897. The vulnerability...more

Security Snippets: FBI warns critical infrastructure of increasing attacks from China

Cyberattacks from China are targeting critical infrastructure including communications, energy, transportation, and water. Critical U.S. infrastructure may face a higher risk of cyberattacks from the People’s Republic of...more

Security Snippets: Fortra GoAnywhere file transfer tool vulnerability discovered

Vulnerabilities in enterprise file transfer solutions can lead to elevated risk. Now would be a good time to check your organization’s managed filed transfer service....more

Security Snippets: Rapid SCADA vulnerabilities create risk

Industrial automation platform Rapid SCADA contains seven key vulnerabilities. CISA recently published an advisory about seven vulnerabilities in Rapid SCADA—an open-source industrial automation platform that provides tools...more

Security Snippets: Ivanti faced with a third critical vulnerability according to CISA

CISA has added a new Ivanti vulnerability to its known exploited vulnerability catalogue. This vulnerability can be paired with other recently-reported vulnerabilities to permit threat actors to write malicious web shell...more

Security Snippets: Microsoft SharePoint vulnerability to watch out for

A vulnerability in Microsoft SharePoint has been flagged as being actively exploited by CISA. A vulnerability in Microsoft SharePoint is being actively exploited according to CISA’s known exploited vulnerabilities (KEV)...more

Agencies issue guidance on delayed SEC reporting of material cybersecurity incidents - SEC Update

Since December 18, 2023 public companies other than smaller reporting companies are required to report a cybersecurity incident under Item 1.05 of Form 8-K within four business days after the company determines the incident...more

Executive order on AI issued by California’s governor signals continued focus on GenAI

Yesterday, California Governor Gavin Newsom issued an executive order regarding generative artificial intelligence (“GenAI”). The order states that California has established itself as the world leader in GenAI innovation...more

Securing Cyberspace: White House releases National Cybersecurity Strategy

The Biden Administration released its National Cybersecurity Strategy (Strategy) in an effort to reshape U.S. policy and priorities around cybersecurity for the public and private sectors, marking a significant shift in tone...more

The Federal Communications Commission (again) sets its sights on cybersecurity

The field of regulators interested in the cybersecurity practices of private companies is getting crowded, with the Federal Communications Commission (FCC) becoming more and more active in this space. The FCC, which has...more

Employers Take Notice: Increased Cybersecurity Threats Amid Coronavirus Precautions

On March 11, the Word Health Organization officially characterized the coronavirus (COVID-19) outbreak as a pandemic. During the outbreak, many employers around the world are seeking to prioritize the well-being and safety of...more

38 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide