A recently discovered botnet called Gitpaste-12 has returned with a new assault targeting web applications, IP cameras, and routers.Where did it begin?Gitpaste-12 was first discovered by Juniper...
Weak passwords can lead to brute force attacks and enterprises are facing the wrath of it amid the ongoing pandemic. With the shift to remote work,...
Australian regulators have proposed sweeping changes to the country’s Privacy Act of 1988 that take the EU’s GDPR as a blueprint. On December 14, the Office of the...
Security researchers from Trustwave have lifted the lid on a raft of recently revealed security vulnerabilities in routers from D-Link. Five vulnerabilities in the DSL-2888A router, a higher end,...
A security researcher has chained multiple vulnerabilities in Trend Micro’s InterScan Web Security Virtual Appliance (IWSVA) to seize control of the web gateway security product. Sysadmins...
The Cybersecurity and Infrastructure Security Agency (CISA) and government and industry members of the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force released an...
The World Economic Forum today launched a new report that outlines how organizational leaders can influence their companies and encourage the responsible use of technology and...
Recently, Dutch media reported the alleged hacking of Donald Trump’s Twitter account after a Dutch researcher correctly guessed the president’s password: “maga2020!” Security researcher and ethical hacker Victor Gevers could access to Trump’s...
According to media reports, the U.S. Energy Department and National Nuclear Security Administration have evidence that hackers accessed their networks as part of a major cyber espionage...
President-elect Joe Biden also promised to elevate cybersecurity “as an imperative” across government. The House committees on Homeland Security and Oversight and Reform Thursday launched an...