Mobile Device Management: Securing the modern workplace
[ This article was originally published here ] The content of this post is solely the responsibility of the author. AT&T does not adopt or…
[ This article was originally published here ] The content of this post is solely the responsibility of the author. AT&T does not adopt or…
The Commonwealth Bank has appointed a new chief technology officer, with Rodrigo Castillo starting in the role this week. Rodrigo Castillo (Image credit: Gavin Munroe/LinkedIn)…
Zimbra has released ZCS 10.0.2 that fixes two security issues, including the known bug that could lead to exposure of internal JSP and XML files.…
Russia-linked BlueBravo has been spotted targeting diplomatic entities in Eastern Europe with the GraphicalProton Backdoor. The Russia-linked threat-state actor BlueBravo (aka APT29, Cloaked Ursa, and…
CISA says new malware known as Submarine was used to backdoor Barracuda ESG (Email Security Gateway) appliances by exploiting a now-patched zero-day bug. A suspected…
IN SUMMARY Crypto theft date: July 22, 2023 CoinsPaid strengthens systems post-attack Blockchain Security firms Chainalysis and Match Systems aid the investigation Cryptocurrency payments platform…
With ransom payments declining, ransomware gangs are evolving their extortion tactics to utilize new methods to pressure victims. This was seen by both the Clop…
Starting this fall, Apple has announced that developers will be required to provide a reason for using certain APIs that can collect information from their…
Ivanti has fixed another vulnerability in the Endpoint Manager Mobile software (formerly MobileIron Core), exploited as a zero-day to breach the IT systems of a dozen ministries in…
In the month of May, both Google and Apple made the announcement that they were going to work together to stop intrusive monitoring using AirTags…
CISA warned today of the significant breach risks linked to insecure direct object reference (IDOR) vulnerabilities impacting web applications in a joint advisory with the…
IN SUMMARY The attack lures users into downloading malicious versions of well-known apps through Google Search results. These apps include AnyDesk, AnyConnect, WinSCP, Treesize, Cisco,…