News

  • Deadbolt Ransomware Extorts Vendors and Customers

    PRIVACY PRIVACY New report provides in-depth look at novel NAS-based threat Read More

    Read More

  • 8 top multi-factor authentication products and how to choose an MFA solution

    PRIVACY PRIVACY Today’s credential-based attacks are much more sophisticated. Whether it’s advanced phishing techniques, credential stuffing, or even credentials compromised through social engineering or breaches of a third-party service, credentials are easily the most vulnerable point in defending corporate systems. All these attacks key on traditional credentials, usernames and passwords, which are past their expiration…

    Read More

  • Software Supply Chain Attacks Soar 742% in Three Years

    PRIVACY PRIVACY Sonatype reveals scale of threats to open source ecosystem Read More

    Read More

  • How Card Skimming Disproportionally Affects Those Most In Need

    PRIVACY PRIVACY When people banking in the United States lose money because their payment card got skimmed at an ATM, gas pump or grocery store checkout terminal, they may face hassles or delays in recovering any lost funds, but they are almost always made whole by their financial institution. Yet, one class of Americans —…

    Read More

  • Zoom Patches High-Severity Flaw in macOS Client

    PRIVACY PRIVACY The flaw could allow an attacker to connect to clients and control the Zoom Apps running in it Read More

    Read More

  • HelpSystems Patch Falls Short, RCE Vulnerability in Cobalt Strike Remains

    PRIVACY PRIVACY Certain components in Java Swing will interpret text as HTML content if it starts with Read More

    Read More

  • Spyder Loader Malware Deployed Against Hong Kong Organizations

    PRIVACY PRIVACY The attackers reportedly remained active on some networks for more than a year Read More

    Read More

  • Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself

    PRIVACY PRIVACY Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for a period of nearly five years.  Toyota says the breach is the result of a subcontractor posting source code for Toyota’s “T-Connect” app on the software development platform GitHub in December 2017. This…

    Read More

  • 4 Business Goals You Can Achieve While Scaling Cybersecurity

    PRIVACY PRIVACY There are at least four business goals that organizations can achieve by scaling their cybersecurity programs through CIS SecureSuite Membership. Read More

    Read More

  • GitGuardian adds IaC scanning to code security platform to protect SDLC

    PRIVACY PRIVACY GitGuardian has added infrastructure-as-code (IaC) scanning to its code security platform to enhance the security of software development. The firm said the new feature will help security and development teams write, maintain, and run secure code, protecting the software development lifecycle (SDLC) against risks like tampering, code leakage and hardcoded credentials. The release…

    Read More

News, Advisories and much more

Exit mobile version