The precautions and techniques that have been put in place for the protection of email messages from unauthorized access, interception...
Software as a service (SaaS) has taken over, and the average enterprise now uses hundreds of unique SaaS applications to accelerate their digital transformation and business velocity....
One of the main contributors to the weak security posture of development environments is the complexity and knowledge gap created by the number of tools and...
Malcolm Harkins will be joining the Epiphany Systems executive team as Chief Security Officer. With deep cybersecurity domain experience, along with substantial operational understanding on the challenges...
An open source tool that makes grepping the internet for web vulnerabilities simpler, faster, and cheaper was unveiled at Black Hat USA today. Security researchers and bug bounty...
UPDATED A 12-year-old authentication bypass vulnerability that could allow attackers to compromise networks and devices has been discovered in at least 20 router models, potentially affecting millions of users....
Software supply chain attacks are growing at an alarming pace, in a stark development that upends the delicate balance cybersecurity relies on, infosec luminary Matt Tait told delegates...
Old fashioned data theft is still the main reason adversaries are targeting a popular open-source application management system. U.S. cybersecurity agencies are following up on a...
A security vulnerability in popular dating site OkCupid meant an attacker could dupe users into unknowingly ‘liking’ or sending messages to other profiles. The flaw, which...
A newly fixed bug in the Chromium project allowed malicious parties to inject code in embedded site pages, even if these resources were isolated from the...
A cyberattack has brought down an Italian COVID-19 vaccine-scheduling website. Italian authorities said cybercriminals attacked the technology systems of the Italian region of Lazio. Chuck Everette,...
Recent Comments