Cyber-Criminals Exploit Invasion of Ukraine
Rise in malspam campaigns exploiting attack on Ukraine by Russia Read More
Vulnerabilities in Over 100k Medical Infusion Pumps
Security researchers find 75% of smart infusion pumps are susceptible to known vulnerabilities Read More
Samsung Encryption Flaw
Researchers have found a major encryption flaw in 100 million Samsung Galaxy phones. From the abstract: In this work, we expose the cryptographic design and...
Attivo Networks expands Active Directory protection
A popular target of attackers, Microsoft Active Directory will receive an extra measure of protection under a new offering announced Thursday by Attivo Networks. The...
CIS Benchmarks March 2022 Update
The following CIS Benchmarks have been updated or released for March 2022. We've highlighted the major updates below. Each Benchmark includes a full changelog that...
Nearly All Cybersecurity Companies Expose AWS Assets – Report
Study uncovers 200,000 such assets across 35 vendors Read More
Over 60% of SOC Analysts Are Planning to Quit Next Year
Report reveals SecOps teams are overworked and understaffed Read More
What is RBAC? Role-based access control explained
Role-based access control, or RBAC, is an approach for restricting access to digital resources based on a user’s role in an organization. For instance, under...
Russian Claims YouTube “Misinformation” to Blame for Protests
In the meantime, Ukrainian sites are being hacked to spread fake new Read More
Cyber-Attack on New York Ethics Watchdog
Servers of Joint Commission on Public Ethics targeted by cyber-criminals Read More