Researchers find numerous Apple AirPlay vulnerabilities allowing “wormable” exploits over Wi-Fi

Security researchers have uncovered a critical set of vulnerabilities in Apple’s AirPlay protocol that could allow attackers to remotely hijack devices without any user interaction. The exploit chain, known as “AirBorne,” consists of 23 individual bugs, including 17 that have official CVEs. This means that zero-click remote code execution is possible on vulnerable systems, putting […]

Read More →

Zero Trust everywhere: How MGM Resorts found agility and security with Zscaler

MGM Resorts has adopted a zero trust approach to improve security and agility in their operations. Collaborating with Zscaler, they have transformed their security architecture by eliminating implicit trust and rethinking branch configurations. This article discusses MGM’s practical implementation of zero trust and how it enhances both security and employee productivity. Source: CIO Key Points […]

Read More →

Resignation of the government: the impact on pending legislation

The recent resignation of the government after a failed motion of confidence has thrown various legislative processes into disarray, particularly affecting proposals related to cybersecurity, artificial intelligence, and data management. The President’s decision to dissolve Parliament means that these initiatives must be freshly proposed when the new parliamentary term begins. Source: Lexology Key Points The […]

Read More →

DuPage County, Ill., Cyber Attack Shutters Justice Systems

A ransomware attack has forced the closure of vital systems in DuPage County, Illinois, impacting the sheriff’s office, circuit clerk’s office, and the courthouse. This incident, first identified around 2:30 a.m. Monday, has raised concerns about data security and operational continuity within the county’s justice system. Source: Naperville Sun Key Points A ransomware attack has […]

Read More →

SBOMs (as well as HBOMs and CBOMs) as Cybersecurity Facilitators

Software Bills of Materials (SBOMs) are increasingly recognised as essential tools in the realm of cybersecurity. They enable companies to locate and address software vulnerabilities, thus enhancing overall security. The article delves into the significance of SBOMs, HBOMs, and CBOMs, underscoring their role in managing software risks and ensuring compliance in today’s complex digital landscape. […]

Read More →

The Wiretap: The Worrying Rise Of ‘Violence-As-A-Service’

This article discusses the alarming trend of ‘violence-as-a-service’, highlighting how young people are being lured into committing violent acts for criminal organizations. Europol has reported that organised criminal groups are recruiting vulnerable teenagers, exploiting their situations to offer violent services online, effectively outsourcing illicit activities. Source: Forbes Key Points Europol warns that young people are […]

Read More →