News
Latest breaking cybersecurity newsTrustNet team attends RSA Conference 2023: Our Impression and Thoughts
TrustNet team attends RSA Conference 2023 to stay ahead of cybersecurity, receive awards, and decipher Frisco’s charms Every year since 1991, IT companies showcase their products and services at a venue where the world’s preeminent organizations and thought leaders...
Cybercriminals Are Getting Faster at Exploiting Vulnerabilities
The race continues over which side of cybersecurity will gain the upper hand in the next few years. There are some good news and a few alarming ones. But one detail stands out in the 2022 study by Rapid7: the bad side appears to be gaining speed. Rapid7's...
Microsoft Sounds Alarm on Ransomware Threats to Apple’s MacOS
Apple's macOS, known for its security features and stability, has long been considered a haven for users who want to keep their devices and data secure. However, recent findings by Microsoft security researchers suggest that this perception may no longer be accurate....
Drizly CEO Facing Unprecedented Sanctions for Data Privacy Violations
Online alcohol delivery service company, Drizly and its former CEO are facing a series of sanctions from the Federal Trade Commission (FTC) for violating data privacy rules. The FTC has imposed unprecedented personal liability on the former CEO, which will impact him...
Hack the Pentagon 3.0: Shifting Focus to Facility Control Systems
The Department of Defense's bug bounty program, known as Hack the Pentagon, is launching its third iteration. This time, it will focus on the facility control system network. The third iteration of the program, which is known as Hack the Pentagon 3.0, will look into...
Code-Injection Bugs Bite Google, Apache Open-Source GitHub Projects
Two of the most popular open-source ventures have identified several weaknesses, Google and Apache. The vulnerabilities may be used to access various proprietary information stealthily and provide access to lateral movement in a firm. Moreover, the glitch may be used...
AICPA Updates SOC 2 Guidance: What’s Changed?
The AICPA has revised and updated the SOC 2 guidelines. There are no changes to the SOC 2 trust services criteria (commonly referred to as control objectives) however, there are new and revised “points of focus.” At the core, the points of focus provide...
Corporate Employees Conned by Sneaky Stealers Using Fake Zoom Downloads
A new sneak attack is hitting the computer systems of corporate workers by redirecting users to fake download sites for popular productivity software, such as Zoom. Researchers at Cyble revealed that the attackers behind the new strain, which is known as Rhadamanthys...
Trends and Predictions for Cybersecurity 2023
The field of cybersecurity is constantly evolving due to the rapid advancements in technology and the constantly changing threat of cybercrime. To stay informed and be prepared for the future, it is important to understand what experts predict for cybersecurity in...
ChatGPT: Cybersecurity Threat or Not Really?
Artificial intelligence (AI) has become commonplace in many aspects of our lives in recent years. We have seen AI used to automate customer service helplines, improve the accuracy of facial recognition software, and even power...