Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CVE-2024-8068 and CVE-2024-8069: Citrix Session Recording Vulnerability

Two Citrix vulnerabilities (CVE-2024-8068 and CVE-2024-8069) can potentially lead to unauthenticated remote code execution. Note: according to the vendor, privilege escalation to NetworkService Account access in Citrix Session Recording and limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording is possible when an attacker is an authenticated user in the same intranet.

Xalient Extends Approved Supplier Status on G-Cloud 14 Framework

Effective from November 9, 2024, G-Cloud 14 supersedes G-Cloud 13, further enabling public sector organisations—from government agencies and local authorities to healthcare, educational, and emergency services—to easily access and procure cloud services. As a G-Cloud 14-approved supplier, Xalient provides seamless access to secure cloud solutions critical to digital transformation across the UK.

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight

In today’s complex cybersecurity landscape, addressing the controls within the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) is critical when seeking to build rapport and work with the Australian Government. Australian cybersecurity regulations like the ISM and E8 outline foundational steps, including cybersecurity best practices and controls for data protection strategies.

Fireblocks Deepens Collaboration With the TON Foundation: Introducing Support for Jettons and $200k Grant Program

Secure access to the latest blockchains and their features is a core focus at Fireblocks, thereby empowering our customers to take advantage of new market opportunities and enhance their offerings. In the past year alone, we’ve added support for over twenty new blockchains, helping thousands of digital asset businesses to grow their revenue and expand their reach.

Boosting Mobile Defense: A Comprehensive Guide to Mobile Security

Your organization’s mobile security strategy is a vital part of your overall cybersecurity posture. Not only do mobile devices contain valuable personal data, but they also serve as a gateway to the information you store in the cloud. If you issue smartphones and tablets to your employees, a single high-profile vulnerability could compromise dozens of devices. If you embrace bring-your-own-device (BYOD) policies, you may not have any visibility into the applications your employees use.

OT Security Challenges and Solutions for Critical Infrastructure Protection

Critical infrastructure systems, such as power plants, water treatment plants, transportation networks, and factories, depend on operational technology (OT) to work. OT systems are meant to handle physical devices and processes, while traditional IT systems are mostly concerned with keeping data and information safe. Because of this main difference, OT security is very hard, especially since OT networks are becoming more and more linked to IT networks, which makes them more open to cyber dangers.

Lessons from a Honeypot with US Citizens' Data

Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work investigating potential risks and threats to the election system, from disinformation campaigns to nation-state actors looking to exploit vulnerabilities. No information that may have potentially affected the election process was discovered at any time during the research. If it had, Trustwave SpiderLabs would have immediately disclosed its findings to the proper authorities.

How to Augment Creative With AI: Using RAG for Generative Art and Design

In the rapidly advancing field of artificial intelligence, innovative techniques like Retrieval Augmented Generation (RAG) are revolutionizing how AI systems generate content. RAG, a powerful approach that combines knowledge retrieval with language generation, has the potential to transform various domains, including generative art and design. This article explores how RAG can augment creativity in AI, focusing on its applications in generative art and design.

What Are the Key Features of the Best Membership Website Builders?

A membership site is one great way to monetize your content, build a community, or offer exclusive products and services. When setting up a course platform, a subscription service, or a niche community, the right membership website builder is crucial to its success. But among all the options from a membership website builder, which best fits you? Here, we discuss what features to look for in a membership website builder so you can determine whether the website will have the tools it needs to reach its full potential.