The hosting provider had not applied Microsoft's new patch due to publicly reported issues with the update.
Read moreFive Guys Data Breach Puts HR Data Under a Heat Lamp
January 5 2023Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack.
Read moreWhat Are Some Ways to Make APIs More Secure?
January 5 2023Developers should go beyond the basics to make it harder to exploit the API.
Read moreEffective and Efficient Automation for Security Teams
January 5 2023Even very short tasks may be worth automating if you do them frequently. Here's how to decide what to tackle first.
Read moreSerious Security: How to improve cryptography, resist supply chain attacks, and handle data breaches
January 5 2023Lessons for us all: improve cryptography, fight cybercrime, own your supply chain... and don't steal my data and then pretend you're sorry.
Read moreBitRat Malware Gnaws at Victims With Bank Heist Data
January 4 2023Attackers have compromised a Colombian financial institution and are using a bevy of leaked customer details in further malicious activity to spread an info-gathering remote access Trojan (RAT).
Read moreUnderstanding Infrastructure-as-Code Risks in the Cloud
January 4 2023Improve overall IT administration and establish a framework to identify misconfigurations and automate the process of checking IaC before it makes it into the production environment.
Read more
Recent Comments