Recent Security News
-
Critical Citrix NetScaler Flaw Exploited to Target from Government, Tech Firms
October 18, 2023 at 09:15AM Citrix has issued a warning about a critical security flaw in its NetScaler ADC and Gateway appliances, known as CVE-2023-4966. The vulnerability could expose sensitive information and requires devices to be configured as a Gateway or AAA virtual server for exploitation to occur. Patches were released on October 10, 2023,…
-
CIA exposed to potential intelligence interception due to X’s URL bug
October 18, 2023 at 09:05AM An ethical hacker exploited a bug in the way X truncates URLs to take control of a CIA Telegram channel used for intelligence. The bug caused the Telegram link to be shortened incorrectly, allowing the hacker to register a new, unregistered handle. The issue could have exposed the CIA to…
-
Data Security and Collaboration in the Modern Enterprise
October 18, 2023 at 08:55AM Modern enterprises face the challenge of balancing the need for data collaboration and expanded access with the increased risk of cybersecurity threats. Traditional data security measures are insufficient for the data needs of modern enterprises. The CISO Survival Guide emphasizes the importance of data access control and the intersection of…
-
Fraud Prevention Firm Fingerprint Raises $33 Million
October 18, 2023 at 08:48AM Fraud prevention provider Fingerprint has raised $33 million in a Series C funding round, bringing its total funding to $77 million. The Chicago-based company offers a device identification platform-as-a-service that helps organizations identify fraudsters while providing a seamless experience for legitimate users. Their device fingerprinting technology and flexible APIs enable…
-
Lost and Stolen Devices: A Gateway to Data Breaches and Leaks
October 18, 2023 at 08:48AM Lost and stolen computers pose a significant risk to data security, accounting for 17% of breaches. The threats include unauthorized access, lack of encryption, and physical access to corporate networks. To mitigate this risk, organizations should train employees, implement geolocation and geofencing, conduct endpoint data discovery, apply endpoint data encryption,…