Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CVE-2024-50388: Critical OS Command Injection Vulnerability in QNAP HBS 3 Hybrid Backup Sync

On October 29, 2024, QNAP issued a security advisory regarding a critical OS command injection vulnerability, tracked as CVE-2024-50388. Discovered by researchers at the Pwn2Own conference, this vulnerability affects HBS 3 Hybrid Backup Sync, a backup and disaster recovery solution used by organizations for secure data protection across multiple locations. The flaw allows remote attackers to execute arbitrary commands.

DORA vs. NIS2 vs. PSD2: Navigating the Evolving Regulatory Landscape

The legal and regulatory landscape is constantly evolving, continually intensifying the demands placed on organizations. As well as meeting the requirements of existing regulations such as the Payment Services Directive 2 (PSD2), companies must contend with the upcoming introduction of the Network and Information Security Directive or NIS2 (Directive (EU) 2022/2555) and the Digital Operational Resilience Act (DORA).

Turbocharge Cybersecurity with Detection and Response

Ransomware is on the rise, cyber insurance is hard to get, and employees are still clicking on things that they shouldn’t. Even as criminals make use of automated tools to unlock threat vectors, new AI-based detection and response solutions enable advanced techniques to find and eliminate lurking threats and turbocharge cybersecurity. Join WatchGuard experts for an eye-opening session on how AI is transforming MSP businesses, so they increase security efficacy, build trust with clients, and grow with detection and response innovation.

Tanium DEX Walkthrough - Digital Employee Experience - Tanium Tech Talks #110

See a full demo of Tanium's enhanced Digital Employee Experience. Tanium combines real-time monitoring, automated self-remediation, rapid incident investigation, and secure remote desktop capabilities to enhance IT efficiency and security and improve employee satisfaction. Integrate with ServiceNow to further enhance service desk efficiency.

Remote Desktop Protocol (RDP) Vulnerability

Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, providing the user access to remotely connect with another computer. Microsoft’s remote desktop protocol is one of the best currently available in the market, working efficiently with an effortless graphical user interface (GUI). It can be used between multiple Windows Operating Systems and Devices. This article discussed RDP protocol security and current RDP vulnerabilities.

Best Practices for Protecting Drone Data in Commercial Applications

Hey there, tech enthusiasts and masters of the skies! With the soaring ascent of drones in commercial applications, it's not just about nailing the perfect aerial shot anymore-it's also about locking down that precious data. Drones are busy bees, collecting loads of info that need protection just as much as any ground-based data trove. We've all heard the horror stories of data breaches resulting in hefty fines and reputational damage. That's why I'm here to guide you through the labyrinth of drone data security, helping your business keep its digital treasures under a virtual lock and key.

The effectiveness of AiSDR: fast response, high conversion and customer engagement

Today's businesses strive to continuously improve customer interactions to achieve higher conversion rates, faster response times, and expand their customer base. One of the leaders in applying artificial intelligence to sales and marketing is AiSDR. Their solutions automate key business processes, dramatically speeding up response times, improving sales efficiency, and reaching wider audiences. In this text, let's look at exactly how these factors impact the success of companies utilizing AiSDR solutions..

GigaOm Declares Torq the Autonomous SOC Leader, Dramatically Outpacing Legacy Vendors

GigaOm provides technical, operational, and business advice for IT’s strategic digital enterprise and business initiatives. GigaOm applies proven research and methodologies designed to avoid pitfalls and roadblocks while balancing risk and innovation, empowering enterprises to successfully compete in a changing business atmosphere. GigaOm recognizes Torq as the only Hyperautomation vendor capable of delivering true autonomy to the SOC without vendor lock-in.

Cybersecurity Expert Gaurav Sood Addresses Digital Arrest Scams on CNBC Awaaz | miniOrange

@NarendraModi Calls for Vigilance and Warns of “Digital Arrest” Scams in Digital arrest' frauds have reached alarming levels in India, with losses exceeding ₹120 crore to scammers posing as law enforcement. These fraudsters prey on victims by threatening arrest and demanding large sums as bail or clearance fees. Recent cases reveal that 46% of these attackers operate from Southeast Asia, deceiving individuals with claims of illegal goods or fake documents in their names.

Trustwave SpiderLabs 2024 Trustwave Risk Radar Report: Defining the Cyber Assault on the Retail Sector

The holiday shopping season is almost here, and according to the 2024 Trustwave Risk Radar Report: Retail Sector, threat actors have honed their skills and are prepared to use ransomware and phishing attacks that leverage well-known online brands to conduct direct attacks and fraud operations against retailers and consumers. Skills they will then use to infiltrate retail organizations of all types throughout the rest of the year.