Ransomware Breach Victim Numbers Fall by 25% in Q1 2022
Activity is set to pick up this year as new groups appear Read More
Who is your biggest insider threat?
Penetration testing has shown cybersecurity manager David Murphy just how problematic people can be. In his career, he has seen people pick up and use...
Crypto Dev Gets Five Years for Helping North Korea Evade Sanctions
Virgil Griffith presented at a conference in Pyongyang Read More
April Records First Patch Tuesday of 2022 with 100+ CVEs
Microsoft fixes two zero-days in latest update round Read More
Post Title
Multiple vulnerabilities have been discovered in Citrix SD-WAN. Citrix SD-WAN is a software defined Wide Area Network (WAN) which can allow for easier management of...
CitySprint confirms security breach, warns delivery drivers their personal data may be in the hands of hackers
Same-day delivery firm CitySprint has warned couriers it has suffered a data breach that may have allowed hackers to access their sensitive personal data. Read...
USN-5377-1: Linux kernel (BlueField) vulnerabilities
It was discovered that the network traffic control implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause...
DSA-5120 chromium – security update
Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. Read More
DSA-5119 subversion – security update
Several vulnerabilities were discovered in Subversion, a version control system. Read More
What is phishing? Examples, types, and techniques
Phishing definition Phishing is a type of cyberattack that uses disguised email as a weapon. These attacks use social engineering techniques to trick the email...