SAP has released patches for 16 vulnerabilities with Critical, High, Medium, and Low severities. The CVSS scores for these vulnerabilities...
Microsoft has announced today the general availability of Microsoft Defender for Individuals, the company’s new security solution for personal phones and computers. This new cross-device security...
According to Volexity, a webshell was discovered in Atlassian Confluence server during an incident response investigation. Volexity determined that it was a zero-day vulnerability that could...
If your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the “encrypt” button, which types of data...
Fraud is a persistent threat, and there’s no end in sight as the e-commerce landscape continues to evolve and the use of online payment platforms increases. According to one...
Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege —...
If it seems like you’re receiving more spam than normal, you probably are. Seventy-four percent of consumers say they have received a scam text so far...
The Digital Operational Resilience Act would force non-EU companies with a significant presence in member states to create subsidiaries that can be regulated under their jurisdiction....
When it comes to federal cybersecurity policy, the executive branch is far ahead of Congress. The White House’s cyber executive order and subsequent policies like the...
The Cyber-Informed Engineering Strategy is organized across five pillars. The Department of Energy this week released its national Cyber-Informed Engineering Strategy that provides guidance for building resilient energy...
US law enforcement has announced the dismantling of infrastructure used by a Russian botnet responsible for the compromise of millions of computers and internet-connected devices worldwide....
Recent Comments