Cadbury Warns of Easter Egg Scam
Cyber-criminals target sweet-toothed consumers with fake Easter Egg hunt scam Read More
The Russian cyberattack threat might force a new IT stance
With the threat of Russian cyberattacks still with us, companies need to be on a war footing when it comes to security. Read More
Activist Admits Shutting Down California County’s Website
Commander X attacked Santa Cruz County government’s site during no-camping law protest Read More
Wyze Camera Vulnerability
Wyze ignored a vulnerability in its home security cameras for three years. Bitdefender, who discovered the vulnerability, let the company get away with it. In...
Post Title
A vulnerability has been discovered in Trend Micro Apex Central which could allow for arbitrary file upload. Trend Micro Apex Central is a web-based console...
Post Title
A vulnerability has been discovered in versions of Zyxel Firewall’s CGI program which could allow for authentication bypass. Zyxel Firewall is a next generation firewall...
JavaScript supply chain issues
In open source we trust JavaScript code—used in 98% of all global websites–is a notable contributor to the ongoing software supply chain attack problems. In...
New insider threat: Bad business decisions that put IP at risk
The existence of policies and procedures surrounding the implementation of a business strategy are the hallmarks of maturity within a company’s growth. When insiders make...
Keeping secrets in a devsecops cloud-native world
Devsecops adoption is widely underway, with many organizations looking to break down silos among development, security and operations while leveraging cloud-native architectures to drive secure...
Trezor Customers Phished After MailChimp Compromise
Attackers target users’ wallets with convincing emails Read More