Fortinet Acquires Unicorn Lacework to Enhance Cloud Security

Deal Integrates Lacework’s CNAPP into Fortinet’s Security Fabric and SASE Platform Fortinet extended a lifeline to troubled cloud security vendor Lacework, agreeing to purchase the late-stage startup that once earned the largest funding round in cybersecurity history. The Silicon Valley-based platform security vendor said the proposed acquisition of San Jose, California-based Lacework will enhance Fortinet’s…

Read More

Deepfakes, Fraudsters and Hackers Are Coming for Cybersecurity Jobs

Companies in the market for cybersecurity professionals could face a new method of attack, made harder to spot because of artificial intelligence: Hackers posing as job applicants. As cyber threats targeting U.S. companies multiply, some security leaders have increased scrutiny during hiring to weed out bad actors—or simply applicants with over-embellished resumes. Globally, the cyber…

Read More

Central cyber security agency warns users about vulnerabilities in Microsoft Edge

The Indian Computer Emergency Response Team has found multiple vulnerabilities in the Microsoft Edge browser. As per the agency, these vulnerabilities could potentially be exploited by an attacker to compromise the targeted system. After warning Android users of vulnerability, the Indian Computer Emergency Response Team (CERT-In), which operates under the Ministry of Electronics & Information…

Read More

Russian Hackers Claim Cyberattack on Spanish Defence Company

Santa Barbara Systems, a General Dynamics (GD.N) subsidiary in Spain that is refurbishing Leopard tanks for delivery to Ukraine, suffered a cyberattack on its website, a pro-Russia hacker group said. A spokesperson for General Dynamics confirmed that the defence contractor’s Spanish unit had been targeted in an attempted cyberattack “that was detected immediately and has not…

Read More

SANS-GIAC Workforce research report for yr 2024 ‘Hire, Retain Mid-level cyber security professionals

SANS-GIAC Workforce research report for the year 2024 is based on a first-of-its-kind survey that analyzed the cybersecurity workforce with the goal of identifying the key factors to successfully build high-performing cybersecurity teams. The report focuses on efforts to hire and retain mid-level cyber security professionals The survey results analysed in this report zero in…

Read More

Tata Group working on 100 Gen AI projects: Chandrasekaran

Tata group chairman N Chandrasekaran on Friday said companies in the diversified group are executing over 100 generative artificial intelligence projects. AI can also have negative impacts, Chandrasekaran said, flagging potential job losses and privacy concerns as the areas we need to focus on. Addressing the group’s information technology (IT) services arm TCS’ 29th annual…

Read More

Trend Micro taps Nvidia Software tools for AI Cybersecurity Offering

On Sunday, Trend Micro announced its collaboration with Nvidia to develop new cybersecurity tools utilizing artificial intelligence, aimed at securing the data centers where AI operations occur. These tools, showcased at the Computex conference in Taiwan, are designed to run on Nvidia’s chips, detecting intruders and ensuring that only authorized personnel can access sensitive data….

Read More

Sophos the Cybersecurity Company Appointed Joe Levy as CEO

Joe Levy, who has been serving as acting CEO since 15 February, brings nearly three decades of experience in cybersecurity product development and leadership to his new role. Levy also spearheaded the creation of SophosAI and Sophos X-Ops, an operational threat intelligence unit comprising over 500 cybersecurity operators and threat intelligence experts. Sophos said this…

Read More

Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware

Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware Courtroom software hijacked discovered by researchers of Rapid7 A vulnerability (CVE-2024-4978) has been identified in JAVS Viewer v8.3.7, a critical component for managing digital recordings in legal and government environments.  The installer for this version is backdoored, allowing attackers to remotely seize control of infected…

Read More