The past 12 months have been a trying time for cyber security professionals globally. Most notably, they’ve had to contend…
Security researchers have found a new exploit that allows attackers to remotely execute code through Outlook Web Access (OWA), on…
Two critically important security vulnerabilities that Citrix fixed in recent months, still remain vulnerable on thousands of Citrix gateways and…
By Brett Raybould, EMEA Solutions Architect, Menlo Security Malicious payloads are one of the leading challenges facing organizations today. From…
By Dominick Birolin, CISSP, CISA, NSE4 When it comes to finding and keeping the specialists necessary to defend an organization…
Incident & Breach Response , Leadership & Executive Communication , Security Operations Security Director Ian Keller Rants About Bad Coding…
In 2021, Finland set a goal of raising its expenditure on research, development and innovation (RDI) to 4% of GDP…
Santosh Kamane is a veteran security professional with about two decades of experience in progressively building information security and risk…
The Lazarus Group, the infamous North Korean state-sponsored hacking group has become the latest threat group to evade Microsoft’s Mark…
Intel is splitting its graphic chips unit into two as it realigns the business to better compete with Nvidia and…
Numerous Netgear WiFi router models were susceptible to a high-severity vulnerability that had been patched by Netgear. Multiple variants of…
Critical Infrastructure Security , Cybercrime , Fraud Management & Cybercrime 30 Million Purported Passenger Records Listed for Sale on Cybercrime…