The average higher education institution is getting hit once a week now, and as one Oregon State University attack shows, the sector often lacks the resources to keep pace.
| LATEST SECURITY NEWS & COMMENTARY | Microsoft: BYOD, QR Codes Lead Rampant Education Attacks The average higher education institution is getting hit once a week now, and as one Oregon State University attack shows, the sector often lacks the resources to keep pace. Critical Mozilla Firefox Zero-Day Allows Code Execution The bug is already being exploited in the wild, but Firefox has provided patches for those who may be vulnerable. Fidelity Notifies 77K Customers of Data Breach The third-party actor had access for two days, in the financial services company's second major breach of the year. Vulnerability Prioritization & the Magic 8 Ball Vulnerability prioritization has evolved over the years. Several frameworks exist to help organizations make the right decisions when it comes to deciding which patches to apply and when. But are these better than a Magic 8 Ball? Walking the Tightrope Between Innovation & Risk When employees and leaders engage with CISOs early in innovation projects, security concerns are addressed proactively, building trust and ensuring innovation and security coexist. (Sponsored Article) Securing AI With Confidential Computing By enabling secure AI deployments in the cloud without compromising data privacy, confidential computing may become a standard feature in AI services. MORE NEWS / MORE COMMENTARY | | | | HOT TOPICS | How Major Companies Are Honoring Cybersecurity Awareness Month The annual event reinforces best practices while finding new ways to build a culture where employees understand how their daily decisions affect company security. Find out how AWS, IBM, Intuit, SentinelOne, and Gallo are spreading the word. Google Launches Data-Sharing Initiative to Fight Fraud Global Signal Exchange will act as a global clearing house for online scams and fraud signals. Australia Intros Its First National Cyber Legislation The bill is broken up into several pieces, including ransomware reporting and securing smart devices, among other objectives. Mamba 2FA Cybercrime Kit Targets Microsoft 365 Users A stealthy new underground offering uses sophisticated adversary-in-the-middle (AitM) techniques to convincingly serve up "Microsoft" login pages of various kinds, with dynamic enterprise branding. Building Cyber Resilience in SMBs With Limited Resources With careful planning, ongoing evaluation, and a commitment to treat cybersecurity as a core business function, SMBs can transform their vulnerabilities into strengths. MORE |
| | PRODUCTS & RELEASES | Introducing Mayhem: ForAllSecure Unveils New Name and Company Focus 90% of Successful Attacks Seen in the Wild Resulted in Leaked Sensitive Data OpenGradient Raises $8.5M to Decentralize AI Infrastructure and Accelerate Secure, Open-Source AI MORE PRODUCTS & RELEASES |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|