How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Read moreIT asset tracker and auditor software has a critical issue with insecure object deserialization that could allow threat actors to execute code, researchers say.
Read moreAs more employees plan on taking longer holidays and working remotely from the destination for part of that time, organizations have to consider the risks. Like Wi-Fi networks.
Read moreDevelopers need to be cautious about whom they trust on GitHub because it's easy to establish fake credibility on the platform, security vendor warns.
Read moreJoshua Schulte has been convicted for his role in the Vault 7 Wikileaks data dump that exposed invasive US cyber intelligence tactics.
Read moreResearchers who helped thwart the Russian nation-state group's recent attack on Ukraine's power supply will disclose at Black Hat USA what they found while reverse-engineering the powerful Industroyer2 malware...
Read moreAnd some ways to up your game for identifying fabricated online profiles of people who don't exist.
Read moreOffensive security leader continues to defy market and economic trends with record growth and recognized innovation.
Read moreVulnerability will remain a "significant" threat for years to come and highlighted the need for more public and private sector support for open source software ecosystem, Cyber Safety Review...
Read more
Recent Comments