How MSPs and MSSPs offer vCISO services with skilled CISOs in short supply
A new eBook by Cynomi, “What does it take to be a full-fledged Virtual CISO?” lays out exactly how service providers can easily, rapidly, and economically expand…
A new eBook by Cynomi, “What does it take to be a full-fledged Virtual CISO?” lays out exactly how service providers can easily, rapidly, and economically expand…
Microsoft and CrowdStrike have defended themselves against a series of accusations by Delta, saying the US airline, which was particularly badly hit during the 19…
Threat actors are actively attempting to exploit a recently fixed Progress WhatsUp Gold remote code execution vulnerability on exposed servers for initial access to corporate networks. The…
Cybersecurity firm Bitdefender reveals critical vulnerabilities in solar power management platforms, putting 20% of global solar production at risk. Attackers could cause blackouts and disrupt…
Fortinet, a major player in the cybersecurity industry, has acquired data security startup Next DLP for an undisclosed sum. The acquisition, set to be finalized…
Aug 07, 2024Ravie LakshmananEmail Security / Vulnerability Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software that could be exploited to…
Aug 07, 2024Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick that could be exploited to…
It has been described in various evocative ways across popular culture, reflecting its vastness and potential for discovery. But, as the industrialisation of space starts…
In yet another significant blow to the cryptocurrency ecosystem, blockchain platform Nexera has fallen victim to a major hack. While initial reports suggested that the…
A vulnerability in Microsoft 365’s anti-phishing measures allows malicious actors to deceive users into opening harmful emails by hiding the First Contact Safety Tip using…
Attackers, including nation-state actors, increasingly leverage legitimate cloud services for espionage operations, exploiting their low-profile and cost-effective nature. The services, such as Microsoft OneDrive and…
Amazon’s e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast online presence covering multiple domains…