A recently resolved vulnerability in GravCMS created a means for unauthenticated attackers to hijack admin functions on vulnerable content management systems, among other potential exploits. The...
A security researcher at Google has disclosed long-awaited details of zero-click vulnerabilities in the Linux Bluetooth subsystem that allow nearby, unauthenticated attackers “to execute arbitrary code with kernel...
News broke today that Matrix, the open source, decentralized communications network, has reached the milestone of gaining 30 million users. Matrix is powered by the Matrix.org Foundation, a...
A majority of respondents said they sacrificed security of IoT devices to respond to COVID-19 policies and for expedience generally. Verizon’s annual mobile security index attached...
Apple announced it will start enforcing a new privacy notification rule that digital advertising firms such as Facebook have warned will hurt their profits. According to...
Meet Jeremy Leasher, Security Solutions Architect at Axellio. Leasher believes the IT security industry is undergoing a serious skills crisis, threatening to undermine the security of commercial and...
Working with an MDR provider gives you the talent, tools and full coverage you need There was a time when corporate IT only worried about computing,...
Researchers at Rapid7 evaluated five areas of cybersecurity that are both critical to secure to continue doing business on and across the internet, and are squarely...
The North Korean-backed Lazarus hacking group used new malware with backdoor capabilities dubbed Vyveva n targeted attacks against a South African freight logistics company. Vyveva was first...
Tech support scammers are pretending to be from Microsoft, McAfee, and Norton to target users with fake antivirus billing renewals in a large-scale email campaign. While...