The top 5 security vulnerabilities for 2023 have been revealed by a recent study, with Apache and OpenSSH services being the most...
MetaMask and Phantom are warning of a new ‘Demonic’ vulnerability that could expose a crypto wallet’s secret recovery phrase, allowing attackers to steal NFTs and cryptocurrency stored...
Ever since 2004, the payment card industry has required merchants who accept credit card payments to adhere to the Payment Card Industry Data Security Standards (PCI...
Security researchers are warning that threat actors could hijack Office 365 accounts to encrypt for a ransom the files stored in SharePoint and OneDrive services that companies use...
A threat actor known as ‘Blue Mockingbird’ targets Telerik UI vulnerabilities to compromise servers, install Cobalt Strike beacons, and mine Monero by hijacking system resources. The...
Middle market companies face an increasingly volatile cybersecurity environment, with threats coming from more directions than ever before and more skilled criminals targeting the segment, according...
SolarWinds released the findings of its ninth annual IT Trends Report which examines the acceleration of digital transformation efforts and its impact on IT departments. The...
Ping Identity and Yubico surveyed IT leaders across the globe to determine their appetite for passwordless solutions. Overwhelmingly, the desire was clear to adopt more secure and convenient...
Montrose Environmental Group, a US-based provider of environmental services, has revealed it was hit by a ransomware attack last weekend that disrupted its laboratory testing operations. In...
A memcached injection vulnerability in business webmail platform Zimbra could allow attackers to steal login credentials without user interaction, security researchers have revealed. Zimbra, an open source alternative...
Ground commanders have been unable to capitalize on at least one previous cyber strike. As the Ukraine war continues, U.S. officials worry that Russia might resort...
Recent Comments