How to Set Up a VPN
In today’s connected world, you can do so much on the internet. It’s never been easier to stay entertained (Netflix, anyone?), informed, and productive. But...
How Microsoft Purview can help with ransomware regulatory compliance
Nations across the globe are taking regulatory action to reduce the ransomware threat. In March, for example, new U.S. ransomware reporting requirements were signed into...
How the Secure Software Factory Reference Architecture protects the software supply chain
The term “factory” related to software production might seem bizarre. Most still associate it with the collection, manipulation and manufacturing of hard materials such as...
Yodel Cyber Incident Disrupts UK Deliveries
Experts suspect ransomware as the cause Read More
Euro Cops Dismantle Multimillion-Dollar Phishing Gang
Europol trumpets Dutch and Belgian police work Read More
tor-0.4.7.8-1.fc36
FEDORA-2022-456b252727 Packages in this update: tor-0.4.7.8-1.fc36 Update description: Fix for CVE-2022-33903 (bz#2099227 / bz#2099228 / bz#2099229) Read More
#InfosecurityEurope2022: Geopolitical Tensions a “Danger” to Cybersecurity
During a keynote talk, Mischa Glenny explained challenges geopolitical tensions create for cybersecurity Read More
Israeli military personnel spied on via Strava fitness-tracking app
The Strava fitness-tracking app is being used to spy upon members of the Israeli military, tracking their movements at secret bases across the country and...
CVE-2017-20084
A vulnerability has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832 and classified as critical. Affected by this vulnerability is an unknown functionality of the...
CVE-2017-20083
A vulnerability, which was classified as critical, was found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. Affected is an unknown function of the component SSH Server....