Threat actors are impersonating journalists, colleagues and interested parties to obtain credentials in spear-phishing attacks, agency warns
Including climate change and resource scarcity
Miscreants could use the bug to launch remote code execution attacks
Attackers used login details obtained from third-party platforms
Fixes included for nearly 100 flaws and exploits
Threat actors exploited an open redirect available on the site
Attackers targeting banks in French-speaking countries using live-off-the-land and off-the-shelf tools have many similarities with the OPERA1ER group, say researchers
Research from Accenture provides an insight into why there are so few female CISOs, along with plenty of advice for both C-suites and aspiring women leaders on how to help more women rise to the top.