The vulnerability was being exploited in the wild, targeting two versions of Adobe ColdFusion.
Read moreControversial Cybercrime Law Passes in Jordan
August 23 2023The increase in cyberattacks against the Middle East in the last few years has pressured Jordan and other nations to better secure their infrastructures.
Read moreMalware aimed at macOS is no longer just a knockoff of a Windows bug, as a new infostealer proliferating on Mac laptops demonstrates.
Read moreSmart light bulbs could give away your password secrets
August 23 2023Cryptography isn't just about secrecy. You need to take care of authenticity (no imposters!) and integrity (no tampering!) as well.
Read moreMakers of vulnerable apps that are exploited in wide-scale supply chain attacks need to improve software security or face steep fines and settlement fees.
Read moreIn large metropolitan areas, tourists are often easy to spot because they're far more inclined than locals to gaze upward at the surrounding skyscrapers. Security experts say this same...
Read moreWhen Leadership Style Is a Security Risk
August 23 2023Risk-aware leaders can be a cybersecurity advantage. Their flexible leadership style and emphasis on security first help set the tone and demonstrate a commitment to avoiding risk.
Read more
Recent Comments