Cybersecurity is an important business issue that in theory, every executive wants to prioritize. A great deal of the practical challenges come because so many organizations...
Despite the heavy reliance on the 20-year-old technology, Active Directory, cybersecurity efforts seem to continuously overlook this obvious and frequent target, which only puts organizations at...
Data-stealing malware that hid undetected for years shows that even popular web browser extensions can be vulnerable to exploitation, security researchers from Avast Threat Labs have...
Seven subcommittees will help oversee the vast Defense Department. The House Armed Services Committee separated oversight of intelligence functions from the purview of a subcommittee that...
The release of a more nimble, effective, and versatile version of the Zeoticus ransomware has underlined the growing importance of attack prevention, a security researcher has...
Bleach, a Python library that enables web developers to clean HTML input and prevent cross-site scripting (XSS) attacks, was itself found to have an XSS vulnerability, according to...
A new way to perform an XS-Leak side-channel attack has been disclosed. According to Luan Herrera, a researcher and bug bounty hunter with a particular interest in client-side, browser,...
DH2i, provider of multi-platform Software Defined Perimeter (SDP) and Smart Availability software, announced the results of its premier Virtual Private Network (VPN) survey of IT professionals across...
Siemplify, provider of security orchestration, automation and response (SOAR), released new research on “The State of Remote Security Operations.” Based on a recent survey of nearly 400...
Greek police are set to introduce live face recognition before the summer. By the summer of 2021, the Greek police will receive thousands of devices allowing...