Three Ways that Security in the Azure Cloud Just Got Simpler
In ongoing partnership with Microsoft Azure, CIS has released two CIS Benchmarks, one updated and one new, for Microsoft Azure. Read More
Two Ways that Security in the Azure Cloud Just Got Simpler
In ongoing partnership with Microsoft Azure, CIS has released two CIS Benchmarks, one updated and one new, for Microsoft Azure. Read More
5 ways to grow the cybersecurity workforce
The demand for cybersecurity professionals has surged over the past decade. According to (ISC)2’s 2020 Cybersecurity Workforce Study, while the global cybersecurity workforce need stands...
Large-Scale Collection of Cell Phone Data at US Borders
The Washington Post is reporting that the US Customs and Border Protection agency is seizing and copying cell phone, tablet, and computer data from “as...
What is Data-as-a-Service (DaaS)? Understanding the benefits, and common use cases
This blog was written by an independent guest blogger. If you were looking at all the opportunities data unlocks for your businesses, you’ve probably stumbled...
International cooperation is key to fighting threat actors and cybercrime
In this era of cybersecurity, when nation-state digital attacks and cybercrime quickly cut across country borders and create global crises, international cooperation has become an...
Collaboration is key to balance customer experience with security, privacy
The way Yaron Cohen sees it, companies today must do in the digital world what came naturally to neighborhood merchants who saw their customers every...
ZDI-22-1288: Microsoft SharePoint Workflow Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. Read More
ZDI-22-1289: Apple macOS vImage ICC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that...
ZDI-22-1278: Adobe Animate SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Animate. User interaction is required to exploit this vulnerability in that...