In response to recent events where unidentified cyber actors obtained unauthorized access to the supervisory control and data acquisition (SCADA) system at a U.S. drinking water...
After auditing the security of Helpdesk Software solution Deskpro in accordance with the company’s Responsible Disclosure Bug Bounty Program, the Checkmarx Security Research Team discovered a...
New research from Tessian finds that almost one-third of people have fallen victim to a cyber romance scam, posing a new warning: don’t get cat-phished this...
In today’s world, business process automation solutions are considered the fastest-growing segment on the global enterprise software market. However, both business owners and frequent users alike...
Security ratings or cybersecurity ratings are a data-driven, objective, and dynamic measurement of an organization’s security posture and cybersecurity performance. To learn more about the benefits...
INKY processed 656,954,951 emails in 2020. From this data, they ranked the top 25 most-phished brands during 2020. In round numbers, that’s two-thirds of a billion. Within...
Here are the news and updates you may have missed. A spokeswoman for the National Security Council disputed Congressional intelligence leaders’ characterization of the federal response...
Pro-democracy activists in Hong Kong have “turned to the digital underground” as authorities wield sweeping new surveillance powers, a new report reveals. Dissidents in the Chinese...
A severe unauthenticated SQL injection vulnerability has been patched by developers of the Evolution CMS. Evolution is a PHP-based, open source content management system (CMS) used to manage...
The QIMR Berghofer Medical Research Institute in Brisbane, Australia, is investigating a “likely” data breach after a third-party service was compromised. The medical research institution said its early...