Don’t Wait for a Mobile WannaCry
September 21 2022Attacks against mobile phones and tablets are increasing, and a WannaCry-level attack could be on the horizon.
Read moreAttacks against mobile phones and tablets are increasing, and a WannaCry-level attack could be on the horizon.
Read moreAfter one company suffered a breach that could have been headed off by the MFA it claimed to have, insurers are looking to confirm claimed cybersecurity measures.
Read moreAfter one company suffered a breach that could have been headed off by the MFA it claimed to have, insurers are looking to confirm claimed cybersecurity measures.
Read moreAn unpatched flaw in more than 350,000 unique open source repositories leaves software applications vulnerable to exploit. The path traversal-related vulnerability is tracked as CVE-2007-4559.
Read moreAs ransomware attacks continue to evolve, beyond using security best practices organizations can build resiliency with extended detection and response solutions and fast response times to shut down attacks.
Read moreA stacked combination of hardware and software protects the next version of Windows against the latest generation of firmware threats.
Read moreMicrosoft and VMware are warning that the malware, which first surfaced as a browser-hijacking credential stealer, is now being used to drop ransomware, steal data, and crash systems at...
Read moreThe attack uses hijacked Egress branding and the legit Powtoon video platform to steal user credentials.
Read moreThe airline and the fintech giant both fell to successful phishing attacks against employees.
Read more
Recent Comments