CMG

BLOG / NEWS

Bad News – These Fake LinkedIn Job Offers Are Just Pushing Malware, So Don’t Get Your Hopes Up

Hackers are once again targeting social media. This time, they are taking advantage of people's job-seeking aspirations by using fake…
Read More

Google to Bolster Phishing and Malware Delivery Defenses in 2024

Gmail's email authentication requirements for bulk senders are an important step toward improving email security. As email remains a major…
Read More

4 Pillars for Building a Responsible Cybersecurity Disclosure Program

When vulnerabilities are reported to a cybersecurity company, they must be handled responsibly and transparently. This process should be clear,…
Read More

Thousands Of Juniper Firewalls Are Open To Serious Attack

Juniper's SRX firewalls and EX Series switches are vulnerable to flaws that, when combined, can result in remote code execution….
Read More

Cybersecurity and Compliance in the Age of AI

Cybersecurity compliance officers, alongside specialists like cybersecurity attorneys and network engineers, are essential for implementing security controls and promoting compliance…
Read More

Bookseller Suffers Data Breach Impacting 836k Customers

An international bookseller has reported a data breach affecting 1.2 million users. The company warns that customers' personal information was…
Read More

CEOs Explain How AI Will Super Charge Independent Management Consulting

With Artificial Intelligence (AI), consultants can now provide clients with resources similar to those that large organizations provide their employees,…
Read More

MSSQL Databases Under Fire From FreeWorld Ransomware

Over the past year, malicious activity targeting vulnerable Microsoft SQL servers has increased by 174%! Organizations should consider reducing their…
Read More

Vendors Training AI With Customer Data is an Enterprise Risk

Security concerns could arise when technology vendors use customer data to train Artificial Intelligence (AI) models. Enterprises should take a…
Read More

Your Personal Info Can be Stolen Thanks to Loads of Vulnerable Web Apps

Your company's web apps may have vulnerabilities that could put Personally Identifiable Information (PII) at risk of being stolen. Protect…
Read More
1 2 3 4 5 8