Brother Industries is grappling with a critical authentication bypass vulnerability affecting hundreds of different printer models, many of them used in enterprises,…
Date Archives June 2025
Identity Management and Information Security News for the Week of June 27th: Abstract Security, KnowBe4, Axiad, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Microsoft-Lücke ermöglicht E-Mail-Versand ohne Authentifizierung
Drucker und Scanner werden dank einer Schwachstelle in der Microsoft 365 Direct Send-Funktion zunehmend zu Mitteln für Hacker, um Phishing-Angriffe durchzuführen. FabrikaSimf…
The rise of the compliance super soldier: A new human-AI paradigm in GRC
As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at the intersection of transformation and accountability….
6 key trends redefining the XDR market
The extended detection and response (XDR) market is experiencing significant growth, driven by escalating cybersecurity threats and the need for enterprises to…
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how…
Was CISOs von Moschusochsen lernen können
Von Moschusochsen können sich CISOs eine Scheibe abschneiden – wenn es nach unserem Autor geht. Wirestock Creators – shutterstock.com Drittanbieter-Risikomanagement ist für CISOs…
Don’t trust that email: It could be from a hacker using your printer to scam you
Printers and scanners are increasingly becoming ways for cyber crooks to deliver phishing attacks, thanks to a flaw in the Microsoft 365…
Cisco warns of critical API vulnerabilities in ISE and ISE-PIC
CSOs are being urged to quickly patch multiple vulnerabilities in Cisco Systems Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector…
12 smart contract vulnerabilities and how to mitigate them
Smart contracts execute tasks automatically when specific events occur, and they often handle large data and resource flows. This makes them particularly…