An unpatched remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential harvesting, cyber espionage, and network backdoor attacks.
Read moreIf you want your IT and security administrators to get buried in trivial workloads and productivity bottlenecks, having poor network object management is a great way to accomplish that.
Read moreFor Ransomware, Speed Matters
June 3 2022Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.
Read moreU.S. cybersecurity services firm expands security and identity management services with woman-owned business.
Read moreRemotely Controlling Touchscreens
June 2 2022Researchers have demonstrated controlling touchscreens at a distance, at least in a laboratory setting:
The core idea is to take advantage of the electromagnetic signals to execute basic touch...
Read more
79% of CISOs say continuous runtime vulnerability management is an essential capability to keep up with the expanding complexity of modern multi-cloud environments.
Read moreConti threat actors are betting chipset firmware is updated less frequently than other software — and winning big, analysts say.
Read moreGurucul automating threat detection, investigation and response (TDIR) with advanced analytics, comprehensive threat content, and a flexible enterprise risk engine for hybrid and multi-cloud environments.
Read moreA pair of phishing campaigns against users of WhatsApp and Telegram's Telegraph expose them to extortion, credential harvesting, and even account takeover.
Read moreRSA pivots to exclusive focus. Identity is once again the ‘beating heart’ of RSA.
Read more
Recent Comments