CISA Warns of Active Exploitation in NAKIVO Backup Software Flaw
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted federal agencies about active exploitation of a severe vulnerability in NAKIVO’s Backup & Replication software. Identified as CVE-2024-48248, the flaw allows attackers to access sensitive files remotely, potentially compromising entire infrastructures. Vulnerability Details: CVE-2024-48248 Explained This vulnerability is classified as an absolute path traversal flaw, meaning unauthenticated attackers could remotely

Europe’s Tech Companies Call for Increased Digital Independence from EU
European tech companies have called on the European Commission to urgently support technological independence across the continent. Nearly a hundred businesses, including Sweden-based Cleura, Iver, Redpill Linpro, and Safespring, signed an open letter addressed directly to EU Commission President Ursula von der Leyen. Strategic Digital Autonomy Needed Urgently The letter emphasizes Europe's heavy reliance on technology provided by major international

Sweden Announces New National Cybersecurity Strategy
The Swedish government has unveiled its new national cybersecurity strategy. Covering the period from 2025 until 2029, the strategy prioritizes enhanced cybersecurity readiness and resilience in the face of growing digital threats. Minister for Civil Defence, Carl-Oskar Bohlin, highlighted the strategy’s importance. He emphasized that cybersecurity remains a high-priority area due to escalating geopolitical tensions and increased cyber threats against

10 Priorities for CIOs in 2025
As 2025 begins, CIOs face a technology landscape vastly different from just a year ago. Artificial intelligence (AI), once an emerging innovation, is now mainstream, influencing nearly every aspect of the enterprise. Over the next 12 months, IT leaders can expect even more innovations and significant challenges. To stay ahead, CIOs must continuously assess and adjust their business and technology

Common Phishing Scams and How to Recognize and Avoid Them
Phishing scams are among the most widespread threats in the digital world. They exploit trust to deceive individuals and organizations into revealing sensitive information or performing harmful actions. To protect yourself from these attacks, it's crucial to understand their workings, recognize common types, and learn effective prevention strategies. What Is Phishing and Why Does It Work? Phishing is a cybercrime

US Treasury Department Breached via Remote Support Platform
Chinese state-sponsored hackers infiltrated the U.S. Treasury Department by exploiting a remote support platform used by the agency, according to a letter from the Treasury shared with lawmakers and reported by The New York Times. The breach was first identified on December 8th by BeyondTrust, a vendor providing privileged access management and remote support SaaS solutions. The Treasury Department confirmed

Texas Medical School Notifies 1.5 Million People of Data Breaches Affecting Sensitive Information
Texas Tech University Health Sciences Center (TTUHSC) has revealed two significant data breaches, impacting nearly 1.5 million individuals. These incidents, which occurred in September, compromised personal, financial, and medical information, causing widespread concern among those affected. The breaches targeted two campuses: the main TTUHSC campus in Lubbock, where 650,000 individuals were affected, and the El Paso branch, which involved 815,000
