5 Ways to Reset Your Family’s Digital Habits this Summer
Ahhhh. Can you feel it? Summer is so close. Everything feels a little more buoyant, a little brighter. We’re in the home stretch of social...
New IT/OT Features Help Tenable Customers Increase Visibility, Security and Control
Tenable.ot v3.14 product features increase coverage of segmented networks and give broader visibility across your operational technology (OT) environment. Now more than ever, it is...
Signal Phone Numbers Exposed in Twilio Hack
Twilio was hacked earlier this month, and the phone numbers of 1,900 Signal users were exposed: Here’s what our users need to know: All users...
Establishing a mobile device vulnerability management program
The introduction of mobile devices has rapidly changed the world as we know it, as these small gadgets that are intended to fit into the...
Media Firms Twice as Vulnerable as Cross-Sector Average
Nearly a third have internet-facing bugs, says BlueVoyant Read More
Configuration Errors to Blame for 80% of Ransomware
Microsoft urges better attack surface management Read More
What is the cost of a data breach?
The cost of a data breach is not easy to define, but as more organizations fall victim to attacks and exposures, the potential financial repercussions...
FBI: Beware Residential IPs Hiding Credential Stuffing
Feds warn of various tactics hackers use to hijack accounts Read More
ZDI-22-1155: (Pwn2Own) Softing Secure Integration Server Cleartext Transmission of Sensitive Information Authentication Bypass Vulnerability
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Softing Secure Integration Server. User interaction is required to exploit this vulnerability. Read...
ZDI-22-1156: (Pwn2Own) Softing Secure Integration Server UnZipFolder Directory Traversal Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability,...