Researchers Release Details of New RCE Exploit Chain for SharePoint
September 28 2023One of the already-patched flaws enables elevation of privilege, while the other enables remote code execution.
Read moreChina APT Cracks Cisco Firmware in Attacks Against the US and Japan
September 28 2023Sophisticated hackers are rewriting router firmware in real time and hiding their footprints, leaving defenders with hardly a fighting chance.
Read moreWill Government Secure Open Source or Muck It Up?
September 28 2023The US government aims to support open source projects, while the European Union seeks to make open source projects liable for their software. Which approach will lead to more...
Read moreMicrosoft Adds Passkeys to Windows 11
September 28 2023It's the latest step in the gradual shift away from traditional passwords.
Read moreThreat Data Feeds and Threat Intelligence Are Not the Same Thing
September 28 2023It's important to know the difference between the two terms. Here's why.
Read moreHackers Trick Outlook into Showing Fake AV Scans
September 27 2023Researchers spot attackers using an existing phishing obfuscation tactic in order to better ensure recipients fall for their scam.
Read moreKenyan Financial Firm Fined for Mishandling Data
September 27 2023Kenyan data protection regulator issues monetary penalties to multiple firms for improper handling of personal data.
Read moreHow the Okta Cross-Tenant Impersonation Attacks Succeeded
September 27 2023Sophisticated attacks on MGM and Caesars underscore the reality that even robust identity and access management may not be enough to protect you.
Read more
Recent Comments