
MITRE CVE database saved after last minute reversal
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
A misconfigured Microsoft subdomain seems to have exposed the accounts of 400 million Office 365 users to a po...
According to a report by the American House Oversight Committee, the hack at Equifax in 2017 was completely pr...
Google+ did not succeed when it was still alive, but now that the plug has been pulled out of the social netwo...
Lu Kang, spokesman for Foreign Affairs in China, is unhappy about the global accusations against Huawei. The r...
Trend Micro researchers state that new macro downloaders are using Microsoft Publisher (PUB) files and spam ma...
At least thirteen hundred Dutch financial directors are victims of a hacker group. The hacker group London Blu...
Sophos researchers have found 22 apps with over 2 million downloads from the Google Play Store that contain a ...
Security company ESET has announced that it has discovered 21 new Linux-based malware families. All families w...
According to 86% of the CISOs working for large organisations, cyber intrusions are inevitable. That's what a ...
Trend Micro states that two of the most commonly used machine-to-machine (M2M) protocols have major design fla...