Use zero trust to fight network technical debt
Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing...
Formulating proper data destruction policies to reduce data breach risks
This blog was written by an independent guest blogger. As Morgan Stanley Bank now knows, ignoring certified data destruction policies can be disastrous. The bank...
USN-5342-1: Python vulnerabilities
David Schwörer discovered that Python incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu...
Ransomware Attacks Soar by 100% in 2021
Reports to ICO top 600 in just a year Read More
What can March Madness and 538 teach us about cybersecurity risk?
I love this time of year, with March Madness excitement in the air and my Notre Dame Fighting Irish still in the tournament (as of...
5 old social engineering tricks employees still fall for, and 4 new gotchas
Blame it on pandemic fatigue, remote work or just too much information, but employees appear to be lowering their guard when it comes to detecting...
One in 10 UK Staff Circumvent Corporate Security
Cisco warns of awareness gap among hybrid workers Read More
ZDI-22-542: (0Day) Siemens Simcenter Femap NEU File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in...
DSA-5110 chromium – security update
A security issue was discovered in Chromium, which could result in the execution of arbitrary code if a malicious website is visited. Read More
DSA-5109 faad2 – security update
Multiple vulnerabilities have been discovered in the freeware Advanced Audio Decoder, which may result in denial of service or potentially the execution of arbitrary code...