We take a look at one newspaper’s innovative way of bypassing Russian media restrictions. A Finnish newspaper is making clever…
After announcing Rapid Security Response (RSR) last year, Apple has finally released the first RSR patches to the public. On…
“It’s not worth building a fence if it can be bypassed just two steps to the side” Mail.ru Group is…
A recent vulnerability in the OverlayFS subsystem of the Linux kernel has been found as CVE-2023-0386, with a CVSS score…
By Doug Dooley, COO, The software supply chain has become increasingly complex and dynamic with the rise of cloud computing,…
Hardly a day goes by without news of another hack making the headlines and the hours and days following a…
The Federal Bureau of Investigation (FBI) continues to disrupt the world’s largest shadow eBook library, Z-Library, by seizing more domains…
We’re pleased to announce some enhancements to how Reputation, Signal, and Impact are calculated. These changes will be applied going…
Let’s clear the air first. All websites are hackable. So how often are you conducting a security check on your…
This week’s ransomware news has been dominated by a Royal ransomware attack on the City of Dallas that took down…
Canadian diversified software company Constellation Software confirmed on Thursday that some of its systems were breached by threat actors who…
When you transfer data from an Android to an iOS device, the Move to an iOS app is the go-to…