A hugely popular GDPR compliance plugin for WordPress contained an authenticated, persistent cross-site scripting (XSS) vulnerability related to the insecure use of PHP’s extract() function, according to security researchers. As...
Jerry Caponera, Head of Risk Strategies at ThreatConnect, discusses the importance of developing a risk-oriented view into cybersecurity and why cyber risk needs to be quantified...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released guidance for hardening the security of virtual private network (VPN)...
Better was released in 2016 as a privacy extension for the Safari browser on Apple iOS and macOS. But it might soon have to find a new home....
OWASP celebrated its 20th anniversary last week with a 24-hour webinar that saw the organization officially launch the top 10 web security vulnerabilities for 2021. The online...
Today’s attackers are looking for multi-million-dollar payouts and use increasingly sophisticated methods to achieve their goals. In a world where the types of attacks organizations face...
As digital-based technology advances in complexity, traditional cybersecurity loses its potency, leaving many businesses vulnerable to exploitation. These unintended consequences worsen from cyberattacks which continue to...
We analyzed ransomware’s impact on the share prices of stock market-listed companies that suffered successful attacks. Ransomware attacks can cost organizations huge amounts of money, and...
Cloud apps are now the most common way digital attackers distribute malware. In the second quarter of 2021, researchers found that 68% of malware downloads originated...
Global Commission on the Stability of Cyberspace is a bit miffed its ‘Don’t attack the internet core’ norm is misunderstood The Global Commission on the Stability...