Microsoft today is taking the unusual step of releasing security updates for unsupported but still widely-used Windows operating systems like XP and Windows 2003, citing the discovery of a...
Read moreWebsite Attack Attempts Rose by 69% in 2018
May 15 2019Millions of websites have been compromised, but the most likely malware isn’t cyptomining: it’s quietly stealing files and redirecting traffic, a new Sitelock report shows. Websites suffer an average...
Read moreWebsite Attack Attempts Rose by 69% in 2018
May 15 2019Millions of websites have been compromised, but the most likely malware isn’t cyptomining: it’s quietly stealing files and redirecting traffic, a new Sitelock report shows. Websites suffer an average...
Read moreThrangrycat Claws Cisco Customer Security
May 14 2019A linked pair of vulnerabilities could allow an attacker to take over many different types of Cisco networking components. A recently discovered flaw in Cisco IOS XE software with...
Read moreThrangrycat Claws Cisco Customer Security
May 14 2019A linked pair of vulnerabilities could allow an attacker to take over many different types of Cisco networking components. A recently discovered flaw in Cisco IOS XE software with...
Read moreScarCruft has evolved into a skilled and resourceful threat group, new research shows. ScarCruft, an advanced persistent threat group known for attacking organizations with links to the Korean peninsula,...
Read moreScarCruft has evolved into a skilled and resourceful threat group, new research shows. ScarCruft, an advanced persistent threat group known for attacking organizations with links to the Korean peninsula,...
Read moreHow Open Testing Standards Can Improve Security
May 14 2019When creating security metrics, it’s critical that test methodologies cover multiple scenarios to ensure that devices perform as expected in all environments. Networks are a complex collection of components...
Read moreHow Open Testing Standards Can Improve Security
May 14 2019When creating security metrics, it’s critical that test methodologies cover multiple scenarios to ensure that devices perform as expected in all environments. Networks are a complex collection of components...
Read moreUS States with the Worst Consumer Cyber-Hygiene
May 13 2019Ranking based on consumers’ cybersecurity practices – or lack thereof. US consumers who practice the fewest cybersecurity best practices to protect their data live in the states of Mississippi,...
Read more
Recent Comments