Prison Phone Company Leaked 600,000 Users’ Data and Didn’t Notify Them

Global Tel*Link, a prison phone company, exposed the personal information of 650,000 users with inadequate safeguards and failed to alert them, according to the Federal Trade Commission (FTC). The firm has now agreed to revamp its security measures and will provide free credit monitoring and identity protection. Although no financial penalty has been imposed, further […]

Cybercrime, nuova ondata della campagna malware in Italia dalla Russia

A new wave of Russian-originated malware campaign is impacting Italy, according to cybersecurity experts at CERT-AgID. While attack methodologies have remained unchanged, the malware payload switched from Ursnif to SystemBC and Remcos. The aim is remote control over compromised systems.

Help Bloody Elbow fix its ad problems *UPDATED

The Bloody Elbow website has identified malicious code creating ad-related issues such as page crashes and redirection to phishing sites. The problem, traced back to the ads run on site, was identified with help from readers. The site requested users to report bugs, including providing related details and screenshots, in order to tackle the problem.

The Cyber Resilient CEO: Navigating the Digital Landscape with Vigilance

A cyber resilient CEO understands the importance of cybersecurity and integrates it into the organization’s fabric. Their key traits include proactive risk management, investing strategically in cybersecurity measures and a prepared crisis response. They also prioritize nurturing cybersecurity awareness, adaptability and continuous learning. As the digital risks grow, these CEOs are crucial for protecting a […]

Traditional cloud security isn’t up to the task

Last year, 47% of all data breaches occurred in the cloud, costing the average organization nearly $4.1 million per breach. Despite this, 26% of businesses expect to avoid breaches entirely, according to Illumio. Businesses primarily keep sensitive data in the cloud, leading to concerns around unauthorized cloud service connectivity. The report suggests Zero Trust Segmentation […]

What is GDPR Compliance and its 7 principles?

GDPR, the world’s strictest data privacy law, requires businesses to follow seven principles: lawfulness, fairness, transparency, purpose limitation, data minimisation, accuracy, storage limitations, integrity, confidentiality, and accountability. Understanding and following these principles can help organisations handle personal data responsibly and avoid negative repercussions, including GDPR fines and reputational damage. To aid in GDPR compliance, cybersecurity […]

Cohesity expands collaboration with Microsoft to bring enhanced data security and backup protections to Microsoft 365

Data security company Cohesity has partnered with Microsoft to offer accelerated data loss recovery within Microsoft 365 environments. Cohesity’s DataProtect solution, alongside Microsoft 365’s native Backup Storage, will offer improved backup and recovery performance. This will allow users to better react to security threats and meet strict recovery objectives. Compliance features are also provided, helping […]

Cohesity & Microsoft enhance data recovery in Microsoft 365 collaboration

At Microsoft Ignite 2023, Cohesity and Microsoft announced a joint effort to enhance response and recovery from data loss within Microsoft 365 environments. Cohesity will work on integrating Microsoft 365 Backup Storage with its DataProtect solution, aiming to provide faster data restoration, comprehensive policy-based protection, and AI-based data security features. The partnership intends to bolster […]

AI disinformation campaigns pose major threat to 2024 elections

NTT says artificial intelligence (AI), post-quantum cryptography, and zero trust will shape cybersecurity strategies in 2024, particularly in response to sophisticated ransomware attacks and cyber-espionage. AI will play both offense (malware, phishing and disinformation campaigns) and defense (malware detection, response and security operations). There will also be emphasis on election security and the implementation of […]

Q&A: IP rights in competition in United Kingdom

UK competition law prohibits anticompetitive agreements and abuse of dominance, and deals with mergers, cartel offences, and transactions impacting national security. Post-Brexit, UK courts ensure consistency between UK competition law and pre-Brexit EU competition case law. The law doesn’t specifically mention Intellectual Property Rights (IPRs). The laws are reviewed and enforced by the Competition and […]