Think your data has no value? Scammers disagree
In the first quarter of 2023 there was a significant increase in cyberattacks exploiting trust in established tech brands Microsoft and Adobe, according to Avast.…
In the first quarter of 2023 there was a significant increase in cyberattacks exploiting trust in established tech brands Microsoft and Adobe, according to Avast.…
May 05, 2023Ravie LakshmananVulnerability / Network Security Cisco has warned of a critical security flaw in SPA112 2-Port Phone Adapters that it said could be…
The internet has transformed our lives in many positive ways, but it has also created a new set of challenges, such as the need to…
Here’s a look at the most interesting products from the past week, featuring releases from Dashlane, Immersive Labs, Intruder, Private AI, Vanta, and Veza. Immersive…
The Play ransomware group has continued its operations targeting several US cities and disrupting crucial systems. In the latest turn of events, the ransomware group…
HackerOne’s global Security@ conference is back for its fourth year. This year’s virtual event will take place October 20-22, 2020. Today, we’ve opened our call…
CERT-UA (Ukrainian Government Computer Emergency Response Team) recently reported that the Ukrainian state networks suffered a cyber attack attributed to the notorious ‘Sandworm’ hacking group…
Satori released Universal Data Permissions Scanner, a free, open-source tool that enables companies to understand which employees have access to what data, reducing the risks…
It takes more than one security tool to keep an organization or web applications secure against vulnerabilities. Bug bounty programs and automated security scanning are…
Check Point Research has recently published a study revealing the discovery of a previously unknown malware variant dubbed FluHorse. The malware comprises multiple malicious Android…
Cyber-risk levels have improved from “elevated” to “moderate” for the first time, but insiders represent a persistent threat for global organizations, according to Trend Micro.…
I was asked to write a list of password tips. It’s a short list. OK, it’s time for me to keep a promise. Back in…