CISA has added an actively exploited security bug in the Progress MOVEit Transfer managed file transfer (MFT) solution to its...
A security researcher was able to add a counterfeit test package to the official list of Microsoft Azure SDK latest releases. The simple trick if abused by...
Meet Kevin Bocek, who is responsible for security strategy and threat intelligence at Venafi. He brings more than 16 years of experience in IT security with leading...
Google has released an update for its Chrome web browser that fixes five security flaws, including a zero-day vulnerability known to be exploited by malicious actors. The bugs...
Vectra AI, provider of network detection and response (NDR), released its global survey of 1,112 security professionals working in mid to large sized organizations using Microsoft Office...
HP threat intel team reveals rising web browser exploits, RAT-infested delivery alerts, DOSfuscation and other hacker activity HP Inc. released its new Quarterly Threat Insights Report,...
To mark the anniversary of the shift to remote work due to the pandemic, Randori surveyed 400 security decision-makers to understand how the community was impacted and how...
The surge in their use has also led to a surge in their abuse. But there are steps you can take to better secure your videoconferences....
Lawmakers question why basic security features are not already the default. The White House plans to double down on commercial cloud technology through an upcoming executive...
Email security firm Mimecast has confirmed that a network intrusion earlier this year was conducted by the same “sophisticated” threat group that was behind the SolarWinds...
Three years after the infamous Spectre vulnerability was discovered, hackers can still exploit the security flaw in order to force web browsers to leak information, Google’s...
Recent Comments