How CIS Can Help You Enact Defense-in-Depth in the Cloud
In a previous post, we introduced the concept of defense-in-depth and explained how it strengthens an enterprise’s security program against a Read More
Spaf on the Morris Worm
Gene Spafford wrote an essay reflecting on the Morris Worm of 1988—35 years ago. His lessons from then are still applicable today. Read More
Google hopes to better fight malicious apps with real-time scanning on Android devices
Google has added a new real-time app scanning capability to Google Play Protect in order to help it better protect against malicious apps installed from...
Cybersecurity hiring and retention challenges in 2023
Scott Scheppers, chief experience officer for AT&T Cybersecurity, weighs on how his team is addressing the cybersecurity talent shortage. This is part one of a...
Veeam Patches Two Critical Bugs in Veeam ONE
Two flaws have near-maximum CVSS scores Read More
SIM Box Fraud to Drive 700% Surge in Roaming Scams
Juniper Research warns telcos they need bilateral agreements in place Read More
Critical Atlassian Bug Exploited in Ransomware Attacks
Attempts to deploy Cerber variant on Confluence servers Read More
Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed...
USN-6472-1: GNU Scientific Library vulnerability
It was discovered that GNU Scientific Library incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted...
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
In recent times, the humble password’s efficacy as a security measure has come under scrutiny. With tendencies to be easily guessed, stolen, or bypassed, passwords...