
MITRE CVE database saved after last minute reversal
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
What can you do to properly integrate two-factor authentication (2FA) into your organization without deterrin...
A new phishing campaign posing as the U.S. Postal Service USPS is targeting mobile devices. The attack uses s...
The so-called "J-Magic" malware installs a backdoor on Juniper Networks routers and specifically targets the ...
Ransomware actors targeting ESXi bare-metal hypervisors are using SSH tunnelling to access the system without...
A new vulnerability enables remote code execution (RCE) with system privileges on all Windows endpoints in a ...
Cisco has fixed a critical vulnerability in its Meeting Management tool for the video conferencing platform M...
CloudSEK reveals an advanced method for spreading the Lumma Stealer malware. This is a serious threat to Wind...
Windows 10 22H2 users need not worry about a recent bug in the latest January 2025 Patch Tuesday update. Acco...
CISA, the U.S. cybersecurity agency, and the FBI report that attackers are still exploiting security vulnerab...
Ethical hackers Sam Curry and Shubham Shah managed to hack Subaru's Starlink service. This gave the pair unli...