4 Organizations Accused of Misleading Cyber Disclosures

4 Organizations Accused of Misleading Cyber Disclosures

The Securities and Exchange Commission (SEC) has charged four public companies (current and former) with misleading disclosures about cyber risks and intrusions. The charged companies are Unisys Corp., Avaya Holdings Corp., Check Point Software Technologies Ltd and Mimecast Limited. In order to settle the SEC charges, each company agreed to pay the following civil penalties:  […]

Addressing the Escalation in the Middle East: A Discussion on Humanitarian Law and Disinformation – Episode 25

In episode 25 of the Cybersecurity & Geopolitical Discussion, our expert panel, CYJAX Chief Information Security Officer (CISO) Ian Thornton-Trump, CD, Philip Ingram, MBE, of Grey Hare Media, and Lisa Forte of Red Goat Security, pull apart the rapidly deteriorating situation in the Middle East. Unsurprisingly, a key focus is on the recent audacious pager […]

Iranian cyber attackers are focusing on critical infrastructure entities

An advisory released by the CISA, FBI, NSA, and their international partners warns about the targeting of critical infrastructure entities by Iranian cyber actors through brute force tactics. This activity has been ongoing since October 2023 and has resulted in compromised user accounts in various sectors including government, information technology, energy, engineering, and healthcare. Avishai […]

Securing the network is the top priority for 34% of CIOs

Recent analysis by Extreme Networks revealed that Chief Information Officers (CIOs) are primarily focused on the convergence of networking and security, despite the buzz around AI in the tech industry. The report showed that 34% of CIOs prioritize securing the network, while 22% focus on integrating networking and security. Protecting the network against potential threats […]

Creating a Cyber Resilience Toolkit: A Comprehensive Guide for CISOs

Every chief information security officer (CISO) understands that it’s not a question of “if,” but rather “when,” their business systems will face disruption. This reality persists due to the increasing complexity of network environments and the rising frequency and speed of cyber attacks. The COVID-19 pandemic has further accelerated the interconnectedness of businesses, resulting in […]

CISA catalog now includes SolarWinds Help Desk software vulnerability

Three vulnerabilities have been added to the Known Exploited Vulnerabilities Catalogue by CISA due to evidence of active exploitation. These vulnerabilities are: Microsoft Windows Kernel TOCTOU Race Condition Vulnerability (CVE-2024-30088)  Mozilla Firefox Use-After-Free Vulnerability (CVE-2024-9680)  SolarWinds Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)  These vulnerabilities are frequent attack vectors for malicious actors and pose a […]

Supply Chain Attacks Affecting 68% of Healthcare Workers

An analysis of the impact of cybersecurity incidents on healthcare organizations was conducted in a recent report by Proofpoint. The report reveals that 92% of healthcare organizations surveyed experienced at least one cyber attack in the past year, up from 88% in 2023, with 69% reporting disruptions to patient care. Among those affected by the […]

Study identifies potential risks to 2024 Presidential Election from threat activity

Research released by Fortinet’s FortiGuard Labs highlights the current threats related to the 2024 United States Presidential Election. The research provides a detailed analysis of threats that could impact the electoral process, such as: Phishing scams  Ransomware activity  Malicious domain registration  Security leaders discuss threats to the election Casey Ellis, Founder and Chief Strategy Officer […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.