The Open Web Application Security Project (OWASP) has released an updated draft of its ranking of the top 10 vulnerabilities. The draft release marks the first changes to...
The last year has seen a massive rise in the number of software supply chain attacks aimed at upstream public repositories, a new report has revealed. According to...
Other large tech companies also have considerable control over customers’ devices and insight into their data. Apple’s plan to scan customers’ phones and other devices for images depicting...
Questions leaders can use to measure organization’s ransomware preparedness The vast majority (86.7%) of C-suite and other executives say they expect the number of cyberattacks targeting their...
A potentially troublesome set of web security vulnerabilities in Speer were promptly resolved after the researcher who unearthed the flaws notified its developer. Speer is an open...
Securing the growing hybrid workplace presents exponential threat landscape HP Inc. released its HP Wolf Security Rebellions & Rejections report, a study highlighting the tension between IT teams...
Some of the world’s most successful cybersecurity experts and professionals have embraced Sun Tzu’s “The Art of War” for its themes and guidance on how to prepare for...
A mix of banking applications, cryptocurrency wallets, and shopping apps from the U.S. and Spain are the target of a newly discovered Android trojan that could...
This week marked the return of the notorious REvil ransomware group, who disappeared in July after conducting a massive attack using a Kaseya zero-day vulnerability. Their...
As we approach the 18-month mark of operating in a pandemic environment, it has become quite clear that the key to securing networks with a remote...