Zacks Investment Research (Zacks) has reportedly suffered an older, previously undisclosed data breach impacting 8.8 million customers, with the database...
A high severity security vulnerability found in Qualcomm’s Mobile Station Modem (MSM) chips (including the latest 5G-capable versions) could enable attackers to access mobile phone users’...
Imagine a parent’s terror when the geolocation of their child’s smart watch suddenly switches from tennis practice to the middle of the ocean. This was precisely...
Two vulnerabilities discovered in Microsoft Azure Functions have been disclosed, although severity of one of the flaws was mitigated by a separate implementation bug. Last week,...
The Mauritian government is considering plans to monitor and censor social media by intercepting web traffic. In a consultation document (PDF), the country’s Information and Communication Technologies Authority...
Vice President Kamala Harris is prioritizing cybersecurity as chair of the National Space Council, an official said. A presidential directive aimed at implementing cybersecurity in space...
The department is exploring a “lifecycle refresh” for its Enterprise Vulnerability Scanning Solution program. The State Department wants to make sure its security officials can keep...
The US Department of Defense (DoD) has expanded its security vulnerability disclosure program (VDP) beyond its public-facing websites and web applications to encompass all publicly accessible...
Digital Shadows released new research into the movement of cybercriminal marketplaces with a feature on Genesis market. According to the Digital Shadows Photon Research Team, Genesis is a...
Back before enterprises embraced the cloud and its many benefits, software was released every two years through a formal change management process or organizations would introduce...
This year, Gartner – the world’s leading IT research company – came out with a prediction that upon inspection says a lot about how the highest...
Recent Comments