The Defense Department wants a vendor to manage the next phase of development for the insider threat program’s central database and case management. The Defense Department’s...
Multiple vulnerabilities in open source video platforms YouPHPTube and AVideo could be leveraged to achieve remote code execution (RCE) on a user’s device. Researchers from Synacktiv discovered multiple vulnerabilities in the source...
A new machine learning technique could make it easier for penetration testers to find SQL injection exploits in web applications. Introduced in a recently published paper by researchers...
The domain registration belonging to Perl.com, the popular source of news and information about the Perl programming language, has reportedly been stolen. Brian Foy, a Perl...
As Joe Biden takes office, Justin Crump – CEO of the global risk and intelligence consultancy Sibylline, takes stock of the challenges the new administration will...
In the past year, COVID-19 has had a larger impact on work habits and security environments than any other health emergency in memory. That combined with...
In early 2020, the COVID-19 pandemic took the world by storm. Just as quickly as the virus began to spread, organizations were forced to act and...
It is time to balance the playing field when it comes to our personal data. As we all moved our lives online as a result of...
When you think about cybercrime targets, your mind probably goes to some of the typical organizations; financial institutions, retailers, government agencies, etc. However, since online learning...
Data Privacy Day is a global effort — taking place annually on January 28th — that generates awareness about the importance of privacy, highlights easy ways to protect...