Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fueling Resilience: Strengthening Physical and Cyber Defenses in Oil Refineries

Oil refineries are pivotal nodes in the global supply chain in the vast and critical energy production landscape. They process crude oil into usable products like gasoline, diesel, and various petrochemicals. Therefore, they are always in demand, regardless of the market state. According to Statista, the global oil refinery market size was $1.5 trillion in 2023.

Fines for HIPAA Non-Compliance

In today’s digital age, the exchange and storage of information has become very common in all sectors of the world, healthcare being no exception. But with this transmission and storage comes the dangers of security and unauthorized access. The Health Insurance Portability and Accountability Act (HIPAA) was enacted with stringent regulations to safeguard this data and its violations can be severe.

The Impact of UNECE R155 on Automotive Cybersecurity

In an era where technology and transportation converge, the fusion of vehicles with IoT technologies heralds a new dawn of mobility. This leap forward promises enhanced connectivity and autonomous capabilities, yet casts a shadow of cyber vulnerabilities that could jeopardize not just the integrity of the vehicles but the safety of their passengers.

CVE-2024-3400: Zero-Day Remote Code Execution Vulnerability Exploited to Attack PAN-OS

A command injection vulnerability, being tracked as CVE-2024-3400, was recently discovered in the GlobalProtect feature of Palo Alto Networks PAN-OS software. This vulnerability has a CVSS score of 10 (Critical) and is actively being exploited in the wild. It impacts versions PAN-OS 120.2, PAN-OS 11.0 and PAN-OS 11.1. If exploited on vulnerable PAN-OS versions and distinct feature configurations, an unauthenticated attacker could execute arbitrary code with root privileges on the firewall.

PasskeyScanner: A Kroll BurpSuite Extension for Passkeys

Despite being a globally accepted security measure, passwords have associated issues that have led to countless breaches and compromised systems over many years of not-so-secure authentication technology. Yet passwords remain the dominant form of authentication because more secure options have not been accessible to all users. Passwords have evolved into the security risk they are today because, as the security requirements for passwords have increased, usability has decreased.

iPhone Security: How to Remove A Hacker From My iPhone

We have all become pretty familiar with our smartphones due to the amount of time we spend on them. According to recent data, the average user spends 3 hours and 15 minutes on their phones every day. As a result, the chance of you noticing something is not quite right with your phone is quite high. However, knowing the cause of the problem and how to fix it can be slightly more difficult. Is your iPhone behaving strangely due to outdated software, age, or hardware problem?

Centripetal and 4Data: A Powerful Union for Intelligence Powered Cybersecurity

In the ever-evolving cybersecurity landscape, staying ahead of threats is not just a priority but a necessity. Today, we’re announcing a strategic partnership with 4Data Solutions, a renowned technology solutions provider. This alliance is poised to redefine cybersecurity solutions across the UK while elevating the standards of protection for businesses worldwide.

USPS Surges to Take Top Spot as Most Impersonated Brand in Phishing Attacks

New data shows phishing attacks are deviating from the traditional focus on technology and retail sectors and are opting for alternate brands with widespread appeal. I’ve covered plenty of reports about brand impersonation and it’s almost always Microsoft on top of the list. And with good reason: access to a Microsoft 365 account can give attackers a foothold and potential access to data, applications and more.