In this Help Net Security interview, Omer Cohen, Chief Security Officer at Descope, discusses the impact of identity federation on…
Cybersecurity researchers have uncovered a new cryptojacking campaign targeting the Docker Engine API with the goal of co-opting the instances…
Exploiting Apache2 web servers often involves targeting vulnerabilities such as remote code execution (RCE) and path traversal flaws. Since Apache…
Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device…
Across Europe, cyber security professionals feel increasingly constrained and restricted, according to data produced at professional association ISACA, which reveals…
A critical vulnerability in Western Digital’s My Cloud devices has been identified. An unchecked buffer in the Dynamic DNS client…
Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves…
Here’s a look at the most interesting products from the past month, featuring releases from: Absolute, anecdotes, ArmorCode, Binarly, Bitdefender,…
Oct 01, 2024Ravie LakshmananCorporate Security / Financial Fraud The U.S. Department of Justice (DoJ) has charged a 39-year-old U.K. national…
A plan by Microsoft to use the restart of a Three Mile Island nuclear reactor to help power its expanding…
The PlayStation Network is suffering a global outage, with subscribers confirming that they can no longer play online games or…
As Australian telecommunications operators continue to expand 5G availability across the country and provide faster mobile internet, the use of…











