Recent Security News

  • Critical Citrix NetScaler Flaw Exploited to Target from Government, Tech Firms

    October 18, 2023 at 09:15AM Citrix has issued a warning about a critical security flaw in its NetScaler ADC and Gateway appliances, known as CVE-2023-4966. The vulnerability could expose sensitive information and requires devices to be configured as a Gateway or AAA virtual server for exploitation to occur. Patches were released on October 10, 2023,…

    Read More

  • CIA exposed to potential intelligence interception due to X’s URL bug

    October 18, 2023 at 09:05AM An ethical hacker exploited a bug in the way X truncates URLs to take control of a CIA Telegram channel used for intelligence. The bug caused the Telegram link to be shortened incorrectly, allowing the hacker to register a new, unregistered handle. The issue could have exposed the CIA to…

    Read More

  • Data Security and Collaboration in the Modern Enterprise

    October 18, 2023 at 08:55AM Modern enterprises face the challenge of balancing the need for data collaboration and expanded access with the increased risk of cybersecurity threats. Traditional data security measures are insufficient for the data needs of modern enterprises. The CISO Survival Guide emphasizes the importance of data access control and the intersection of…

    Read More

  • Fraud Prevention Firm Fingerprint Raises $33 Million

    October 18, 2023 at 08:48AM Fraud prevention provider Fingerprint has raised $33 million in a Series C funding round, bringing its total funding to $77 million. The Chicago-based company offers a device identification platform-as-a-service that helps organizations identify fraudsters while providing a seamless experience for legitimate users. Their device fingerprinting technology and flexible APIs enable…

    Read More

  • Lost and Stolen Devices: A Gateway to Data Breaches and Leaks

    October 18, 2023 at 08:48AM Lost and stolen computers pose a significant risk to data security, accounting for 17% of breaches. The threats include unauthorized access, lack of encryption, and physical access to corporate networks. To mitigate this risk, organizations should train employees, implement geolocation and geofencing, conduct endpoint data discovery, apply endpoint data encryption,…

    Read More