PerimeterX released “Shadow Code: The Hidden Risk to Your Website,” the third annual survey conducted with Osterman Research on the use of Shadow Code in web applications. Third-party scripts...
Veritas Technologies surveyed more than 2,000 global IT leaders whose organizations have undertaken pandemic-led digital transformation and found the majority are severely vulnerable to ransomware attacks...
Despite the cliche image of the hooded hacker ensconced in an underground base, furiously breaking through firewalls and other digital security mechanisms, the reality of cybercrime...
During the height of the COVID-19 pandemic, nearly 70% of full-time employees in the United States transitioned to working from home. As we venture into the post-COVID world,...
Iowa-based grain cooperative NEW Cooperative Inc. was struck by BlackMatter ransomware recently and has shut down its computer systems as it tries to mitigate the attack. BlackMatter is...
The Biden administration is allegedly preparing to sanction financial exchanges that facilitate illicit digital payments to cybercriminals. The sanctions could take effect as early as next week....
The popular webinar tool, which integrates with Microsoft Teams, has now closed an exposure containing over a million files with user email addresses and phone numbers...
A Python exploit gives access to more than 10,000 API (Application Programming Interface) keys via Wayback Machine, a project that archives the content of internet sites. While...
Every day a new app shows up for download. To be exact, the Apple store adds about 30,000 new ones each month. And around 3,700 each day are added to...
Threat actors have started to actively exploit critical Microsoft Azure vulnerabilities, just days after Microsoft disclosed them during September’s Patch Tuesday. The OMIGOD flaw, CVE-2021-3864, was discovered by...
Recent Comments