Exploits give attackers a way to create havoc in business-critical SAP ERP, CRM, SCM, and other environments, Onapsis says. Exploits targeting a couple of long-known misconfiguration issues in SAP...
Read moreReal-World Use, Risk of Open Source Code
May 3 2019Organizations are using more open source software than ever before, but managing that code remains a challenge. Open source code is vital to software development at most organizations, but...
Read moreReal-World Use, Risk of Open Source Code
May 3 2019Organizations are using more open source software than ever before, but managing that code remains a challenge. Open source code is vital to software development at most organizations, but...
Read moreStudy Exposes Breadth of Cyber Risk
May 2 2019New study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well. Organizations with high-value external hosts are three times more likely to have...
Read moreStudy Exposes Breadth of Cyber Risk
May 2 2019New study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well. Organizations with high-value external hosts are three times more likely to have...
Read moreDigital Ad-Fraud Losses Decline
May 2 2019Even so, more work remains to be done to address online ad fraud operations that cause billions of dollars in losses annually for advertisers. Industry-wide efforts to combat fraud...
Read moreDigital Ad-Fraud Losses Decline
May 2 2019Even so, more work remains to be done to address online ad fraud operations that cause billions of dollars in losses annually for advertisers. Industry-wide efforts to combat fraud...
Read moreBreach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint. The breach of outsourcing firm Wipro is a cybercriminal...
Read moreBreach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint. The breach of outsourcing firm Wipro is a cybercriminal...
Read moreThe convergence of OT and IP-based IT networks makes society more vulnerable, requiring CISOs to rethink defense. Thanks to technology advances in operational technology (OT) and critical infrastructure, physical...
Read more
Recent Comments