Apple's emergency fixes last week for two actively exploited vulnerabilities neglected previous Big Sur and Catalina versions of macOS, security vendor says.
Read moreEliminating Passwords: One Way Forward
April 6 2022Fast Identity Online (FIDO) technology leverages security keys and biometrics to provide secure authentication.
Read moreThree essential automated DevOps tools can increase the rate of deployment success, reduce errors, raise ROI, and improve data security.
Read moreThe Original APT: Advanced Persistent Teenagers
April 6 2022Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an...
Read moreFBI-Led Operation Disrupts Russian GRU Botnet
April 6 2022"Cyclops Blink" operation disabled firewalls behind the Sandworm hacking team's network of infected victim devices.
Read moreLinux Systems Are Becoming Bigger Targets
April 6 2022To prevent Linux exploits, organizations should establish an integrated security approach that extends to the network edge.
Read moreLinux Systems Are Becoming Bigger Targets
April 6 2022To prevent Linux exploits, organizations should establish an integrated security approach that extends to the network edge.
Read moreWhy are Tor sites hard to locate and therefore difficult to take down? We explain in plain English...
Read moreCyberweapons Arms Manufacturer FinFisher Shuts Down
April 6 2022FinFisher has shut down operations. This is the spyware company whose products were used, among other things, to spy on Turkish and Bahraini political opposition.
Read moreWhy XDR As We Know It Will Fail
April 6 2022Don't take the XDR hype at face value. Do security due diligence and add a connectivity level for data access across all silos for best response.
Read more
Recent Comments