As a significant number of employees are now working remotely, cyber criminals are hard at work devising new ways to infiltrate your networks and take advantage...
Recent news of a cyberattack on a water treatment plant carried out by a remote perpetrator came as an unwelcome shock to organizations around the world. The attack...
COVID made “flatten the curve” a household phrase in 2020, but did you know the concept also applies to vulnerability exploits? It turns out that what’s...
Why aligning IT and Physical Security cybersecurity policies and practices is so important Let’s face it. Cybercriminals are smart. They’re aggressive, persistent, and opportunistic. They can...
GitHub has added support for securing SSH Git operations using FIDO2 security keys for added protection from account takeover attempts. Researchers at North Carolina State University...
Computer scientists have uncovered a flaw in some DNS resolvers that, left unresolved, might be abused to launch DDoS attacks against authoritative DNS servers. The vulnerability – dubbed TsuNAME –...
Six zero-day vulnerabilities in Remote Mouse, a hugely popular app that turns tablets and smartphones into remote controllers for desktop PCs, could potentially lead to zero-click remote...
News quickly spread about a vulnerable call recording app for iPhone named “Call Recorder,” or “Acr call recorder,” as its listing in the Apple App Store...
In a blog post commemorating World Password Day, Google announced the move to make users sign in via a second step after entering a password, such as...
Today, the UK-based National Westminster (NatWest) Bank is emailing multiple customers, asking them to check their debit transactions over the last year. The email alerts state that due...