-
DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?
Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in cybersecurity. These attacks exposed a critical challenge for Chief Information Security Officers (CISOs): holding their ground while maintaining control over cloud security in the accelerating world of DevOps.
-
Update Chrome Browser Now: 4th Zero-Day Exploit Discovered in May 2024
Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said has been exploited in the wild. Assigned the CVE identifier CVE-2024-5274, the vulnerability relates to a type confusion bug in the V8 JavaScript and WebAssembly engine. It was reported by Clément Lecigne of Google’s Threat Analysis Group and Brendon Tiszka of
-
Adaptive Sports Northwest’s Jen Armbruster on making businesses more inclusive to those with disabilities
“As far as my relationship with sports, growing up, it’s always what kept me on track.”
-
First look: $253M Beaverton High School rebuild begins (Renderings)
The schools project will offer 300,000 square feet when it opens in 2026.
-
Exclusive: Chef Peter Cho, Sun Young Park on why they’re closing Toki
News of the restaurant Toki closing later this week has sent ripples through downtown as a high-profile corner of the west end comes available just as what many are hoping will be a busy summer travel season.
-
Oregon health insurers request hefty rate increases for small businesses in ’25
Oregon health insurers’ requests range from 5.7% to 16.3% for 2025.
-
Meet the Business Journal’s 2024 40 Under 40 honorees
This year’s 40 honorees include founders, senior vice presidents, CEOs, partners and more. They represent banks, law firms, nonprofits and national retailers, manufacturers and more.
-
Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern
Ransomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the file-encrypting malware deployed. “Virtualization platforms are a core component of organizational IT infrastructure, yet they often suffer from inherent misconfigurations and vulnerabilities, making them a lucrative and highly effective target for threat actors to abuse,”
-
CISA Warns of Actively Exploited Apache Flink Security Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, the open-source, unified stream-processing and batch-processing framework, to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2020-17519, the issue relates to a case of improper access control that
-
New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts
The China-linked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in Africa and the Caribbean as part of an ongoing cyber espionage campaign. “The campaign adopts Cobalt Strike Beacon as the payload, enabling backdoor functionalities like C2 communication and command execution while minimizing the exposure of their custom tools,”…