Guardicore has discovered a new attack vector on Comcast’s XR11 voice remote that would have allowed attackers to turn it into a listening device – potentially invading your...
On May 7, 2021, Colonial Pipeline’s 5,500-mile east coast pipeline halted its mainline production when administrators detected advanced ransomware. This attack – the most disruptive cyberattack...
Open source code is ubiquitous in modern software. While its convenience supports the demand for faster application development, it is also at risk of being insecure....
Overcome human nature with a “lock the door” mentality The ‘human factor’ has been recognized as the weakest link in creating safe and secure digital environments...
Seldom does a single week pass that we don’t hear about yet another cybersecurity attack. Some are minor, but with growing frequency, they can be catastrophic...
The Cybersecurity and Infrastructure Security Agency (CISA) opened registration for the third annual President’s Cup Cybersecurity Competition. The President’s Cup is a nationwide competition that seeks to identify, recognize,...
A critical security vulnerability in Microsoft’s Azure cloud database platform – Cosmos DB – could have allowed complete remote takeover of accounts, with admin rights to...
President Biden’s executive order on improving the nation’s cybersecurity will impact device manufacturers—even those that don’t sell to the Federal government. In May 2021, President Biden...
The cybersecurity landscape experienced a period of turbulence over the past eighteen months, as companies around the world quickly adopted remote and hybrid working models at...
F5 has fixed more than a dozen high-severity security vulnerabilities in its networking device, with one of them being elevated to critical severity and CVSS score of...
Recent Comments