Ex-Cybersecurity Adviser to Bush, Obama Weighs in On Current Admin

Melissa Hathaway, a former White House cybersecurity adviser, says Biden is pushing through more regulatory reforms than previous administrations.

darkreading – ​Read More

New AI Security Guidelines Published by NCSC, CISA & More International Agencies

The Guidelines for Secure AI System Development have been drawn up to help developers ensure security is baked into the heart of new artificial intelligence models.

Security | TechRepublic – ​Read More

Critical Zoom Vulnerability Let Hackers Take Over Meetings, Steal Data

By Waqas

A critical Zoom Room vulnerability allowed exploiting service accounts for unauthorized tenant access.

This is a post from HackRead.com Read the original post: Critical Zoom Vulnerability Let Hackers Take Over Meetings, Steal Data

Hackread – Latest Cybersecurity News, Press Releases & Technology Today – ​Read More

BlueVoyant Acquires Conquest Cyber to Help Clients Mitigate Risks

BlueVoyant will integrate Conquest Cyber’s technology into its existing products and services to create the first solution to deliver comprehensive internal and external cyber defense mapped to risk maturity.

Cyware News – Latest Cyber News – ​Read More

Thought GDPR Compliance Was Hard? Buckle Up

The days of a one-size-fits-all consent strategy are gone. Consider a two-pronged approach and use smart consent management technology to adapt to differing regulations.

darkreading – ​Read More

Cybercriminals Exploit ActiveMQ Flaw to Spread GoTitan Botnet, PrCtrl Rat

By Deeba Ahmed

The ActiveMQ flaw has been patched, but despite this, numerous threat actors continue to exploit it.

This is a post from HackRead.com Read the original post: Cybercriminals Exploit ActiveMQ Flaw to Spread GoTitan Botnet, PrCtrl Rat

Hackread – Latest Cybersecurity News, Press Releases & Technology Today – ​Read More

Qilin Ransomware Claims Attack on Automotive Giant Yanfeng

The threat actors published multiple samples to prove their alleged access to Yanfeng systems and files, including financial documents, non-disclosure agreements, quotation files, technical data sheets, and internal reports.

Cyware News – Latest Cyber News – ​Read More

Why Ransomware Could Surge in the Middle East & Africa

Organizations from the Middle East and Africa have typically escaped public ransoms, but that’s changing amid heightened geopolitical conflicts and digitalization initiatives.

darkreading – ​Read More