Largest telecom in Africa warns of cyber incident exposing customer data
MTN Group said an “unknown third-party has claimed to have accessed data linked” to parts of its system and that the incident “resulted in unauthorised access to personal information of some MTN customers in certain markets.”
Windows "inetpub" security fix can be abused to block future updates
A recent Windows security update that creates an 'inetpub' folder has introduced a new weakness allowing attackers to prevent the installation of future updates.
RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs
APIs have become foundational to digital business operations, serving as the behind-the-scenes glue that connects apps, platforms and partners. Related: OWASP’s Top 10 Web App Security Risks But this growing reliance has opened a new front in cybersecurity—one where attackers are quietly exploiting weaknesses buried deep in business logic. In this RSAC Fireside Chat, I
Mobile provider MTN says cyberattack compromised customer data
African mobile giant MTN Group announced that a cybersecurity incident has compromised the personal information of some of its subscribers in certain countries.
Baltimore City Public Schools data breach affects over 31,000 people
​Baltimore City Public Schools notified tens of thousands of employees and students of a data breach following an incident in February when unknown attackers hacked into its network.
The CCM’s GRC domain helps organizations ensure that their enterprise risk management and cybersecurity compliance programs effectively address the cloud.
SAP fixes critical Netweaver flaw exploited in attacks
SAP has released out-of-band emergency updates for NetWeaver to fix an actively exploited remote code execution (RCE) vulnerability used to hijack servers.
SAP fixes suspected Netweaver zero-day exploited in attacks
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers.
Getting Started with Kubernetes Security: A Guide | CSA
Walk through what makes Kubernetes security so challenging and how security teams can get started with it in a way that sets them up for long-term success.
Popular LLMs Found to Produce Vulnerable Code by Default
Backslash Security found that naĂŻve prompts resulted in code vulnerable to at least four of the of the 10 most common vulnerabilities across popular LLMs
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide.