Three vulnerabilities have been addressed in Nagios XI, which monitors mission-critical enterprise infrastructure components. Nagios XI monitors applications, services, operating systems, network protocols, systems metrics, and network infrastructure,...
The US National Security Agency (NSA) is warning organizations to avoid using wildcard digital encryption certificates in order to minimize the risk from a new form...
Mobile phone manufacturer ZTE has announced it has launched a public bug bounty program offering up to €2,000 ($2,300) for security vulnerabilities. The program, launched in partnership with...
It’s no secret cyberattacks pose a significant business threat, and whenever a large corporation makes the nightly news for getting hacked, business leaders may be tempted...
Ecuador’s largest private bank Banco Pichincha has suffered a cyberattack that disrupted operations and taken the ATM and online banking portal offline. The cyberattack occurred over the...
The threat landscape continues to expand with an expediential rise in pandemic-related phishing campaigns targeting companies, governments, and individuals. The Federal Bureau of Investigation (FBI) recently...
In the opening column of this series, “Emerging Technology, Evolving Threats,” [check out Part I here and Part II here], I wrote about quantum computing —...
Research into the hacking techniques that result in companies being infected with ransomware offers organizations some useful pointers towards how best to avoid this increasingly common form of...
UPDATED US Senator Elizabeth Warren has proposed a new piece of legislation that will force organizations to disclose when and how much they have paid to ransomware gangs. Last...
A report by Amnesty International links an Indian cybersecurity company to an Android spyware program used to target prominent activists. The investigation comes from Amnesty International’s...
Recent Comments