Managing security in the cloud through Microsoft Intune
For many years, the Group Policy feature of Microsoft’s Windows has been the go-to solution for controlling workstations, providing deployment, and in general, making a...
AI-fueled search gives more power to the bad guys
Concerns about the reach of ChatGPT and how easier it may get for bad actors to find sensitive information have increased following Microsoft’s announcement of...
5 cyber threats retailers are facing — and how they’re fighting back
There are many reasons retailers are juicy targets for hackers. They earn and handle tremendous amounts of money, store millions of customer credit card numbers,...
Just 1% of Cloud Permissions Are Actively Used
Microsoft warns of "permissions gap" security threat Read More
Experts Warn of Self-Funding North Korean Group APT43
Mandiant says unit is focused on espionage and crypto theft Read More
CVE-2022-27598
A vulnerability have been reported to affect multiple QNAP operating systems. If exploited, the vulnerability allow remote authenticated users to get secret values. The vulnerabilities...
CVE-2022-27597
A vulnerability have been reported to affect multiple QNAP operating systems. If exploited, the vulnerability allow remote authenticated users to get secret values. The vulnerabilities...
Legacy, password-based authentication systems are failing enterprise security, says study
Authentication-related attacks grew in 2022, taking advantage of outdated, password-based authentication systems, according to a study commissioned by HYPR, a passwordless multifactor authentication (MFA) provider...
DSA-5380 xorg-server – security update
Jan-Niklas Sohn discovered that a user-after-free flaw in the Composite extension of the X.org X server may result in privilege escalation if the X server...
Protecting Your Parents from Scams with Our New Family Plans
As people get into their 70s, they stand to lose more to fraud than any other age group—which makes a strong case for protecting the...