A novel security vulnerability dubbed “GAZEploit” has been discovered that could allow hackers to capture keystrokes from Apple Vision Pro’s virtual keyboards. The attack exploits the eye-tracking technology used for
Monthly Archives: September 2024
1.3 Million Android TV Box Hijacked By Android.Vo1d Malware
An Android TV Box is a small device that connects to your TV and allows you to access a wide range of online content, apps, and services. It runs on
What is Brute Force Attacks?
In cybersecurity, brute force attacks are a well-known and persistent threat. Despite being one of the oldest methods hackers use, brute force attacks remain a popular and effective tactic for
How a Centuries-Old Company Reached Security Maturity
In this case study, a 180-year-old life and pension insurer brought its security infrastructure into the modern age.
Cyber Staffing Shortages Remain CISOs’ Biggest Challenge
Besides operational issues connected to a talent shortage, the cost of running security platforms — and their training costs — also keeps CISOs up at night.
How CISOs Can Effectively Communicate Cyber-Risk
A proximity resilience graph offers a more accurate representation of risk than heat maps and risk registers, and allows CISOs to tell a complex story in a single visualization.