Experts found a critical flaw in Real-Time Automation’s (RTA) 499ES EtherNet/IP stack that could allow hacking industrial control systems. Tracked as CVE-2020-25159, the flaw is rated 9.8...
The year 2020 has been defined globally by the COVID-19 pandemic. One of few silver linings for this difficult set of circumstances is innovation – redesigning...
This month, we caught up with Tommy DeVoss, who swapped his black hat for a white one after serving a jail term for hacking into US government and military...
New privacy laws will come into force across New Zealand tomorrow (December 1) as authorities tighten rules regarding data protection. The Privacy Act 2020 will mandate...
The UK’s National Cyber Security Centre has issued an alert on the MobileIron remote code execution vulnerability. According to the alert, APT nation state groups and cybercriminals are...
In 2017, Gartner predicted that the public cloud computing industry would be worth $236 billion by 2020, as its demand, driven by the growing number of businesses recognizing...
Cybercriminals have been leveraging lookalike domains in cyberattacks such as Business Email Compromise (BEC), phishing, and online fraud campaigns. Recently, Bolster has evaluated the use of fraudulent...
Cybercriminals are increasingly targeting media agencies in all possible ways. Apart from direct attacks, cybercriminals misuse the brand name to create fake identities, which are then...
High demand for cybersecurity software accelerates company’s product development and market expansion DefenseStorm, the leading cloud-based cybersecurity and cybercompliance management provider to regional and community banks...
An image of stratocumulus clouds from space. (ISS Expedition 34 CrewImage Science & Analysis Laboratory, NASA Johnson Space Center. Derivative work including grading, lens profile correction...