finds

  • Blog

    US court finds spyware maker NSO liable for WhatsApp hacks

    A U.S. federal judge has ruled that Israeli spyware maker NSO Group violated U.S. hacking laws by using WhatsApp zero-days to deploy Pegasus spyware on at least 1,400 devices. NSO Group markets Pegasus as surveillance software for governments that enables clients to monitor victims’ activities and extract data from compromised devices. “This ruling is a huge win for privacy,” WhatsApp’s…

    Read More »
  • Blog

    AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

    For the third consecutive quarter, Gartner has found that cyber attacks staged using artificial intelligence are the biggest risk for enterprises. The consulting firm surveyed 286 senior risk and assurance executives from July through September, and 80% cited AI-enhanced malicious attacks as the top threat they were concerned about. This isn’t surprising, as evidence suggests AI-assisted attacks are on the…

    Read More »
  • Blog

    Human error is cybersecurity’s number one concern, Kaseya report finds

    User behavior is the biggest cybersecurity challenge facing IT organizations today, new research from Kaseya has found, as threat actors and defenders alike increasingly adopt AI. The 2024 Kaseya Security Survey quizzed IT professionals across North America, the UK and EU, as well as APAC and New Zealand, working for companies with annual revenue of between $1 million and $10…

    Read More »
  • Blog

    Federal jury finds that Cognizant discriminated against American IT workers – Computerworld

    “Cognizant is disappointed with the verdict and plans to vigorously defend itself and appeal at the appropriate time. We provide equal employment opportunities for all employees and have built a diverse and inclusive workplace that promotes a culture of belonging in which all employees feel valued, are engaged and have the opportunity to develop and succeed,” the statement said. “Cognizant…

    Read More »
  • Blog

    New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks

    An automated scanner has been released to help security professionals scan environments for devices vulnerable to the Common Unix Printing System (CUPS) RCE flaw tracked as CVE-2024-47176. The flaw, which enables attackers to perform arbitrary remote code execution if certain conditions are met, was disclosed late last month by the person who discovered it, Simone Margaritelli. Although its RCE aspect…

    Read More »
  • Blog

    Sellers that partner with AI are 3.7 times more likely to hit quota, Gartner finds

    Sellers that partner with AI tools are 3.7 times more likely to meet quota than those that do not, the latest research from Gartner has revealed. The research firm quizzed 1,026 B2B sellers between January and March 2024 on the skills required to thrive in a changing B2B landscape. The data crowned AI partnerships as the number one competency required…

    Read More »
  • Blog

    ‘Sherlock’ Finds Matching Usernames Across 400 Social Media Networks

    Want to check if a particular internet handle you encountered online (or created yourself) is being used on any other social networks or websites? Sherlock is a free command line application that scans around 400 social networks and finds accounts that match whatever username you type in. Using this service couldn’t be simpler: Just open it up and type “sherlock”…

    Read More »
  • Blog

    UK watchdog finds Google provisionally guilty of restricting online ad competition – Computerworld

    “Self-preferencing” limits competition As the CMA explains it, digital advertising has various intermediaries that facilitate the sale of online advertising space on websites or mobile apps between two key parties: sellers, aka publishers, and buyers, aka advertisers. Google acts as an intermediary in three key parts of the advertising chain: It operates ad-buying tools for advertisers, Google Ads and DV360;…

    Read More »
  • Blog

    Audit finds notable security gaps in FBI’s storage media management

    An audit from the Department of Justice’s Office of the Inspector General (OIG) identified “significant weaknesses” in FBI’s inventory management and disposal of electronic storage media containing sensitive and classified information. The report highlights multiple issues with policies and procedures or controls for tracking storage media extracted from devices, and significant physical security gaps in the media destruction process. The FBI…

    Read More »
Back to top button
close