Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the importance of strong passwords...
60% of IT and security leaders are not confident in their organization’s ability to ensure secure cloud access, even as adoption continues to grow across a...
https://player.vimeo.com/video/732004606?h=5b4f02ac3b&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 AppViewX has raised $20 million in a Series B funding round, led by growth equity firm and existing investor, Brighton Park Capital. Through its Automation...
From establishing the National Digital Reserve Corps to setting term limits at CISA, here’s what you need to know about the tech and cyber amendments currently...
Atlassian has addressed a hardcoded credential flaw in Questions for Confluence and servlet filter bypasses in multiple other products. The Australian vendor of software development and collaboration tools...
A researcher at security firm Cyllective has unearthed vulnerabilities in dozens of WordPress plugins, affecting tens of thousands of installations. Dave Miller, who leads Cyllective’s penetration testing team,...
As misinformation around the 2020 elections continues to swirl, state election officials say that DHS and CISA should do more to raise up ‘successes’ around efforts...
The Google Workspace team announced today that it started rolling out a new method to block Google Calendar invitation spam, available to all customers, including legacy...
A new ransomware family dubbed Luna can be used to encrypt devices running several operating systems, including Windows, Linux, and ESXi systems. Discovered by Kaspersky security...
A cryptomining gang known as 8220 Gang has been exploiting Linux and cloud app vulnerabilities to grow their botnet to more than 30,000 infected hosts. The group...