Cybercriminals will never run out of ways to breach the security protocols enterprises put in place. As security systems upgrade their defenses, attackers also level up their attacks. They develop stealthier ways to compromise networks to avoid detection and enhance the chances of penetration. Adversarial machine learning, for example, emerges as one of the stealthy…

Ensuring cyber awareness in the healthcare sector

As a result of the COVID-19 pandemic, healthcare professionals have increased their reliance on the internet to carry out their job. From connectivity with patients, to the interconnectivity of different medical devices passing patient data, the threat vector has expanded dramatically, so cyber awareness has become crucial. Healthcare under attack: What about cyber awareness? This…

Exonar, has today published research revealing that 94 percent of IT pros have experienced a data breach, and an overwhelming majority (79 percent) are worried that their current organization could be next. The survey of 500 IT professionals found that when it comes to cybersecurity, employee data breaches are seen as the biggest risk to…

Intelligent processes and tech increase enterprises’ competitiveness

Enterprises of the future will be built on a foundation of artificial intelligence (AI), analytics, machine learning, deep learning and automation, that are central to solving business problems and driving innovation, Wipro finds. Most businesses consider AI to be critical to improve operational efficiency, reduce employee time on manual tasks, and enhance the employee and…

2020 trends in SOX compliance

SOX & Internal Controls Professionals Group released a survey which measures the costs, execution, challenges and priorities faced by companies that comply with the Sarbanes-Oxley Act (SOX). SOX compliance trends “In its fifth year, our survey reflects the broad experience of SOX professionals over time and presents a balanced perspective of the current state of…

WordPress ‘File Manager’ Plugin Patches Critical Zero-Day Exploited in Attacks

Designed to provide WordPress site admins with copy/paste, edit, delete, download/upload, and archive functionality for both files and folders, File Manager has over 700,000 active installs. Assessed with a CVSS score of 10, the recently identified critical security flaw could have allowed an attacker to upload files and execute code remotely on an affected site,…

Attackers are exploiting two zero-day flaws in Cisco enterprise-grade routers

A technical support intervention has revealed two zero-day vulnerabilities in the OS running on Cisco enterprise-grade routers that attackers are trying to actively exploit. Cisco plans to release software updates to plug these security holes, but in the meantime administrators are advised to implement one or all of the provided mitigations. About the vulnerabilities The…