AUGUSTA, Ga. (WRDW/WAGT) – The cyber security talent pool is growing every day, and with the need to fill so many jobs here at home, leaders are cultivating the next generation. Programming, fighting malware and protecting data are just some of the important things cyber security experts do every day. It’s something that’s being invested
Consumers are increasingly discerning about the products they bring into their homes. This is particularly true with the Internet of Things (IoT): electronics like smart thermostats, connected security systems, and voice-activated assistants. However, for all the convenience these products bring, they resulted in a staggering 1.5 billion attacks on IoT devices in the first half
A particularly nasty new piece of MacOS malware has experts issuing warnings for both users and administrators. Dubbed “Poseidon,” the infection seeks to harvest user account credentials and VPN configurations with the end goal being the theft or resale of the pilfered data. In this case, researchers believe that the attacks are the first phase
A threat group likely from Eastern Europe has been showering victims with hundreds of thousands of malware samples, each of which will unleash as many as 10 pieces of malware simultaneously into the targeted systems. The attacks that started early last year unfolded in a manner reminiscent of Russian nesting dolls, with the malware being
A critical GitLab vulnerability could allow an attacker to run a pipeline as another user. GitLab is a popular Git repository, second only to GitHub, with millions of active users. This week, it released new versions of its Community (open source) and Enterprise Editions. The updates include fixes for 14 different security issues, including cross
Multiple vulnerabilities were discovered in Proges Plus Plug&Track products used for temperature monitoring at hospitals, with no patches in sight. The flaws were discovered by Nozomi Networks Labs, which publicly disclosed four vulnerabilities in Sensor Net Connect V2 and three vulnerabilities in Thermoscan IP in a blog post Thursday. Sensor Net Connect is a Linux-based
Thanks to Rachel Bragg, law student at Cumberland School of Law and Summer Associate in our Birmingham office, Summer 2023, for her contributions to this article. I. Introduction In 1999, computer scientist Kevin Ashton coined the term “the Internet of Things” (“IoT”) in order to put a name to his idea of using RFID[1] chips
Every security professional knows that systematically testing defenses is a good idea. Systematic and empirical control testing quite literally underpin much of our discipline. That’s reflected by a variety of security operations — from penetration testing, phishing simulation, and vulnerability scanning to container scanning, data loss prevention and beyond. All these validate the control operation
Healthcare IoT security market is anticipated to exceed USD 1.61 billion by 2031, with a compound annual growth rate (CAGR) of 17.33% over the forecast period. InsightAce Analytic Pvt. Ltd. announces the release of market assessment report on “Global Healthcare IoT Security Market By Solution (Endpoint Security, Content Security, Application Security, And Cloud Security), Service
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published Thursday seven ICS (industrial control systems) advisories that provide timely information about current security issues, vulnerabilities, and exploits surrounding these critical systems. The security agency reported that hardware used across critical infrastructure sectors from companies like TELSAT, SDG Technologies, Yokogawa and Johnson Controls contain vulnerabilities. In