article thumbnail

Cisco addressed Webex flaws used to compromise German government meetings

Security Affairs

Cisco addressed vulnerabilities that were exploited to compromise the Webex meetings of the German government. In early May, German media outlet Zeit Online revealed that threat actors exploited vulnerabilities in the German government’s implementation of the Cisco Webex software to access internal meetings.

article thumbnail

How DSPM Helps Businesses Meet Compliance Requirements

Security Affairs

Organizations in sectors like healthcare, finance, legal, and government often process vast amounts of highly sensitive data, and regulations exist to ensure and verify that organizations are taking appropriate measures to protect employee, customer, and enterprise data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Israeli Government Visits NSO Group Amid Spyware Claims

Data Breach Today

Meeting Comes After World Leaders Appear on Alleged 'Pegasus' Targeting List The Israeli government paid a visit on Wednesday to NSO Group, the company whose spyware is alleged to have been covertly installed on the mobile devices of journalists and activists.

article thumbnail

Ukraine bans Telegram for government agencies, military, and critical infrastructure

Security Affairs

Ukraine’s NCCC banned the Telegram app for government agencies, military, and critical infrastructure, due to national security concerns. ” Despite the ban on military and government devices, Ukrainian users rely heavily on Telegram to communicate and receive news on ongoing conflicts. ” continues the announcement.

Military 341
article thumbnail

Top Considerations for Building an Open Cloud Data Lake

The key prerequisites for meeting the needs of non-technical users while adhering to data governance policies. The primary architectural principles of a true cloud data lake, including a loosely coupled architecture and open file formats and table structures.

article thumbnail

The Australian government wants to respond to attacks on critical infrastructure

Security Affairs

The Australian government aims at giving itself the power to manage the response of private enterprises to cyber attacks on critical infrastructure. The Australian government wants to increase the security of critical infrastructure, for this reason, it plans to manage the response of private enterprises to cyber attacks targeting them.

article thumbnail

Storm-2372 used the device code phishing technique since August 2024

Security Affairs

Russia-linked group Storm-2372 used the device code phishing technique since Aug 2024 to steal login tokens from governments, NGOs, and industries. Microsoft researchers spotted phishing messages posing as Microsoft Teams meeting invitations. ” reads the report published by Microsoft Threat Intelligence.

Phishing 284