New infosec products of the week: March 22, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Drata, GlobalSign, Ordr, Portnox, Sonatype, Tufin, and Zoom. GlobalSign…
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Drata, GlobalSign, Ordr, Portnox, Sonatype, Tufin, and Zoom. GlobalSign…
South Australia’s education management system (EMS) rollout has only reached half of the state’s 900 schools but spent 70 percent of its budget spent, meaning an…
Ransomware continues to hit organizations in all sectors, and attacks regularly make media headlines because of their hard-hitting impact on affected parties. The earliest example…
Cybersecurity researchers have identified a new form of denial-of-service (DoS) attack that could disrupt over 300,000 internet-connected systems worldwide. This novel attack, which targets the…
What is a Cross Tenant migration, and why and when do you need it? Cross-tenant migration refers to the process of moving data, applications, and…
The United Nations General Assembly unanimously adopted the first global resolution on artificial intelligence to encourage protecting personal data, monitoring AI for risks, and safeguarding…
Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild Pierluigi Paganini March 21, 2024 Researchers released a PoC exploit for a critical flaw in…
Today we are going to have a close look at the VvAA, it’s one of the biggest insurance and consulting companies used by doctors and…
Researchers disclosed vulnerabilities today that impact 3 million Saflok electronic RFID locks deployed in 13,000 hotels and homes worldwide, allowing the researchers to easily unlock any…
As tax season rolls around, a period marked by the rush to meet filing deadlines and ensure compliance with tax laws, cybercriminals are ramping up…
The argument is one that some Apple critics have made for years, as spelled out in an essay in January by Cory Doctorow, the science…
Discover how cybersecurity researchers uncover vulnerabilities in Zephyr OS, a real-time operating system used in IoT and embedded devices — Learn about the risks of…