The Knauf Group has announced it has been the target of a cyberattack that has disrupted its business operations, forcing its global IT team to shut...
An ongoing heatwave in the United Kingdom has led to Google Cloud and Oracle Cloud outages after cooling systems failed at the companies’ data centers. For...
The Council of the European Union (EU) said today that Russian hackers and hacker groups increasingly attacking “essential” organizations worldwide could lead to spillover risks and...
Cybersecurity researchers have discovered three Android malware families infiltrating the Google Play Store, hiding their malicious payloads inside many seemingly innocuous applications. The malicious activities suffered...
Six vulnerabilities in the MiCODUS MV720 GPS tracker that’s used by organizations around the world to manage and protect vehicle fleets could be exploited by attackers...
https://player.vimeo.com/video/728084013?h=14204446e2&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 A Software Bill of Materials, often shortened to the acronym SBOM, is a formal, machine-readable inventory of software components and dependencies, information about those components,...
https://player.vimeo.com/video/730245925?h=f38cf44421&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Metasploit is the most used penetration testing framework. In this Help Net Security video, Spencer McIntyre, Lead Security Researcher at Rapid7, talks about how Metasploit enables defenders...
Specops Software released new research finding cybersecurity weaknesses in business web apps including Shopify, Zendesk, Trello, and Stack Overflow. Amid a wave of cybersecurity incidents related...
https://player.vimeo.com/video/731635104?h=3383d699ce&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Huntress, the managed security platform for SMBs, has acquired Curricula, a story-based security awareness training platform that empowers employees to better defend themselves against hackers. In...
Cyber executives may not be sufficiently prioritizing threats from vulnerabilities within the value chain, beyond the immediate boundaries of their own organizations, according to Tata Consultancy...