Chinese APT group uses multiple backdoors in attacks on military and research organizations
Since early this year, a known APT group of Chinese origin has been targeting military industrial complex enterprises and public institutions in Ukraine, Russia and...
Critical Patches Issued for Microsoft Products, August 09, 2022
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged...
Critical Patches Issued for Microsoft Products, August 09, 2022
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged...
OPSWAT launches new malware analysis capabilities for ICS, OT networks
Critical infrastructure cybersecurity vendor OPSWAT has announced new malware analysis capabilities for IT and operational technology (OT). Revealed at the Black Hat USA 2022 Conference,...
Predator Pleads Guilty After Targeting Thousands of Girls Online
West Sussex man blackmailed his victims Read More
Exploit Activity Surges 150% in Q2 Thanks to Log4Shell
Malware and botnet detections also soar Read More
Are cloud containers a sugar-coated threat?
This blog was written by an independent guest blogger. Containerization is a rapidly evolving technology in cloud-native applications. Just like computing systems, containers consist of...
8 tips to secure printers on your network
I recently introduced a Ricoh IM 6500 printer on the office network, and it reminded me that we need to treat printers like computers. These...
How harm reduction can more effectively reduce employee risky behavior
Most cybersecurity professionals know that training employees to follow good cybersecurity practices, such as phishing simulations that find employees at fault for falling for convincing...
Surge in CVEs as Microsoft Fixes Exploited Zero Day Bugs
August Patch Tuesday addresses over 120 vulnerabilities Read More