Attackers can steal NTLM password hashes via calendar invites
A recently patched vulnerability in Microsoft Outlook (CVE-2023-35636) that can be used by attackers to steal users’ NTLM v2 hashes...
Read more →A recently patched vulnerability in Microsoft Outlook (CVE-2023-35636) that can be used by attackers to steal users’ NTLM v2 hashes...
Read more →Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks,...
Read more →Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its...
Read more →CloudFoxable is a capture-the-flag (CTF) style learning platform you can deploy to your playground AWS account. It primarily targets current...
Read more →The SEC has instituted a set of guidelines “requiring registrants to disclose material cybersecurity incidents they experience and to disclose...
Read more →With the integration of sophisticated technologies like over-the-air updates and increased data connectivity, cars are no longer just modes of...
Read more →There has been a sharp increase in cyber inequity globally, with 90% of executives warning that urgent action is needed...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Key elements for a successful...
Read more →A previously patched critical vulnerability (CVE-2023-35082) affecting Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core is being actively exploited, the...
Read more →To achieve the full potential of AI, organizations must reinvent work, reshape the workforce and prepare workers, according to Accenture....
Read more →From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances,...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from Living Security, Skopenow, Skyhigh Security,...
Read more →