Critical Manufacturing Sector in the Bull’s-eye
January 21 2023Serious security flaws go unpatched, and ransomware attacks increase against manufacturers.
Read moreSerious security flaws go unpatched, and ransomware attacks increase against manufacturers.
Read moreHead off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into IoT devices, always change weak default configurations, and regularly...
Read moreFrom an article about Zheng Xiaoqing, an American convicted of spying for China: According to a Department of Justice (DOJ) indictment, the US citizen hid confidential files stolen from his...
Read moreT-Mobile today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. In a filing with federal regulators, T-Mobile...
Read moreThe credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data.
Read moreMultiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user's system.
Read moreMainly Apple iOS in-app ads were targeted, injecting malicious JavaScript code to rack up phony views.
Read moreThe "BoldMove" backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China.
Read moreTraditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
Read more
Recent Comments