The pYahoo Privacy Policy governs how Yahoo and its brands use cookies, device identifiers, and consent across services. It outlines clear options to accept, refuse, or manage data …
Penelope Iroko
-
-
News & ResourcesNation-State Attack
Russian Hackers Target Journalists In Phishing Attack Against Press Freedom
by Penelope Iroko 2 minutes readRussian hackers target journalists in a credential phishing campaign linked to APT28, according to Reporters Without Borders. The operation sought email passwords from RSF staff, partners, and journalists. …
-
News & ResourcesPolicy Framework
India Cybersecurity App Mandate Rolled Back After Privacy Concerns
by Penelope Iroko 3 minutes readThe India cybersecurity app mandate was rolled back this week after India’s telecom ministry reversed course on requiring smartphone makers to preinstall a government app. The decision follows …
-
News & Resources
Zion Schools Shut Down For Days Following School Cyber Security Incident
by Penelope Iroko 3 minutes readThe school cyber security incident in Zion Elementary School, District 6, led to multi-day closures across its seven schools in Lake County, Illinois. District officials disclosed a potential …
-
News & ResourcesWordPress Security
Critical King Addons Vulnerability Exploited To Hack WordPress Sites
by Penelope Iroko 3 minutes readKing Addons vulnerability is being actively exploited to compromise WordPress sites and escalate privileges. Attackers are using automated probes to plant malware and take control. Administrators should apply …
-
News & ResourcesVulnerabilities & Exploits
CISA Warns Of Critical Android 0-Day Vulnerability Exploited In Wild
by Penelope Iroko 3 minutes readAndroid 0-Day Vulnerability warnings intensified as CISA added two Android Framework flaws to the CISA Known Exploited Vulnerabilities catalog. The agency confirmed active exploitation. The vulnerabilities affect Android …
-
News & ResourcesIdentity and Access Management
ServiceNow Veza Acquisition: $1 Billion Identity Security Platform Deal
by Penelope Iroko 3 minutes readThe ServiceNow Veza acquisition is reportedly a $1 billion move to bolster identity security and access governance across enterprise environments. ServiceNow intends to embed Veza’s authorization intelligence into …
-
News & ResourcesData Breaches
DDoS Attack Volume Surges In Q3 As Aisuru Botnet Breaks Records
by Penelope Iroko 2 minutes readDDoS attack volume surged to record levels in Q3, led by the Aisuru botnet, Cloudflare reported. Peaks reached 29.7 Tbps and 14.1 billion pps, stressing global networks. Cloudflare …
-
Endpoint & Network SecurityNews & Resources
Microsoft Silently Patches Exploited LNK Vulnerability Exploit Without Public Disclosure
by Penelope Iroko 2 minutes readLNK vulnerability exploit activity prompted Microsoft to ship silent mitigations after confirmed abuse of Windows shortcut files. SecurityWeek reported the company acknowledged the change without a standard advisory …
-
Data BreachesNews & Resources
RPO Cybersecurity Incident: Orchestra Works With Experts After October Breach
by Penelope Iroko 2 minutes readThe RPO cybersecurity incident in October caused a limited network disruption while core donor systems remained unaffected. The Rochester Philharmonic Orchestra restored access and remediated impacted components. The …