Month: August 2021

Cybersecurity researchers on Monday disclosed a set of nine vulnerabilities known as “PwnedPiper” that left a widely-used pneumatic tube system (PTS) vulnerable to critical attacks, including a possibility of complete takeover. The security weaknesses, disclosed by American cybersecurity firm Armis, impact the Translogic PTS system by Swisslog Healthcare, which is installed in about 80% of
0 Comments
Union IT Minister Ashwini Vaishnaw is likely to meet representatives of social media firms this month, sources said on Monday. This comes amid social media giant Twitter’s involvement in a stand-off with the Indian government for the past several months over the new amendments in the country’s new Information Technology laws with the micro-blogging platform
0 Comments
Data-driven creative for sensitive verticals With big privacy changes, creative has become even more important with verticals like health and wellness and finance. Learn how to make data the backbone of your campaigns. Register for free now All the sessions from Transform 2021 are available on-demand now. Watch now. 61% of digital architects report that
0 Comments
Data-driven creative for sensitive verticals With big privacy changes, creative has become even more important with verticals like health and wellness and finance. Learn how to make data the backbone of your campaigns. Register for free now All the sessions from Transform 2021 are available on-demand now. Watch now. The adoption of cloud technologies continues
0 Comments
The government’s official IT security organisation CERT-In (Indian Computer Emergency Response Team) has asked Apple users to urgently update their iPhone and iPad units to the latest versions. iOS 14.7.1 and iPadOS 14.7.1 were released earlier this week with critical bug fixes. The updates fix a memory corruption zero-day vulnerability that the government confirms is
0 Comments
Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to swiftly weaponize publicly disclosed flaws to their advantage. “Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets,
0 Comments