ISACA: Two-Thirds of Cybersecurity Teams Are Understaffed
ISACA's State of Cybersecurity 2022 report revealed ongoing struggles to hire and retain skilled cybersecurity professionals Read More
Ransomware Payments Hit Record Highs in 2021
Palo Alto claims Conti was most prolific actor last year Read More
Okta CSO: Lapsus Incident Was “Embarrassing”
Firm confirms hackers accessed internal systems via RDP Read More
Investment Fraud Surges as Cybercrime Losses Hit $7bn in 2021
FBI report finds BEC still the biggest earner for cyber-criminals Read More
A lasting trend: As a Service
With budgets tightening across the board and competition for a limited pool of IT and security talent growing fiercer, cyber as a service providers have...
How WiCyS is taking on security’s image problem
The way Janell Straach sees it, the cybersecurity profession has an image problem, and it’s keeping women out of the field at a time when...
USN-5346-1: Linux kernel (OEM) vulnerability
It was discovered that the ICMPv6 implementation in the Linux kernel did not properly deallocate memory in certain situations. A remote attacker could possibly use...
ZDI-22-536: (0Day) Electronic Arts Origin Web Helper Service Link Following Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Electronic Arts Origin. An attacker must first obtain the ability to execute low-privileged...
ZDI-22-537: (0Day) Epic Games Launcher Link Following Denial-of-Service Vulnerability
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Epic Games Launcher. An attacker must first obtain the ability to...
ZDI-22-538: (0Day) Epic Games Launcher Link Following Denial-of-Service Vulnerability
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Epic Games Launcher. An attacker must first obtain the ability to...