Wrongly configured Google Cloud API potentially creates dangerous functionality
Some odd and potentially dangerous behavior within the Google Cloud Platform (GCP) was revealed by cloud security company Mitiga Thursday. If GCP is not configured...
USN-5404-1: Rsyslog vulnerability
Pieter Agten discovered that Rsyslog incorrectly handled certain requests. An attacker could possibly use this issue to cause a crash. Read More
CVE-2022-1388: Authentication Bypass in F5 BIG-IP
CVE-2022-1388: Authentication Bypass in F5 BIG-IP F5 patched an authentication bypass in its BIG-IP product family that could lead to arbitrary command execution. Background As...
Hunter Biden Laptop Repairman Sues Over Hacker Allegations
Repairman sues politician and news media for allegedly calling him a hacker and a Russian asset Read More
GitHub to Enforce Two-Factor Authentication
Code hosting platform to make 2FA mandatory for all code contributors by the end of 2023 Read More
Cybersecurity and resilience: board-level issues
Resilience means more than bouncing back from a fall at a moment of significantly increased threats. When addressing resilience, it’s vital to focus on long-term...
This World Password Day, Here’s How a Password Manager Can Simplify Your Life
Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make sure our passwords are words...
Dell offers data, app recovery support for multicloud assets
Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS. Read More
Illuminate Data Breach Impacts More School Districts
Colorado now affected by incident that compromised data of 820,000 NYC students Read More
$43 billion stolen through Business Email Compromise since 2016, reports FBI
The FBI's Internet Crime Complaint Center (IC3) has issued updated statistics on Business Email Compromise (BEC) attacks which use a variety of social engineering and...