The SolarMarker group is exploiting a vulnerable WordPress-run website to encourage victims to download fake Chrome browser updates, part of a new tactic in its watering-hole attacks.
Read moreSecurity Vulnerabilities in Covert CIA Websites
September 30 2022Back in 2018, we learned that covert system of websites that the CIA used for communications was compromised by—at least—China and Iran, and that the blunder caused a...
Read moreWith the Software Supply Chain, You Can’t Secure What You Don’t Measure
September 30 2022Reports to the National Vulnerability Database jumped in 2022, but we should pay just as much attention to the flaws that are not being reported to NVD, including those...
Read moreDouble-play 0-day in Exchange - what you need to know, and what you can do
Read moreDouble-play 0-day in Exchange - what you need to know, and what you can do
Read moreOnyxia Raises $5M to Help Companies Proactively Manage Cybersecurity Risks Using AI
September 30 2022Onyxia, an AI-powered cybersecurity strategy and performance platform providing a centralized way for security teams to monitor and manage cybersecurity efforts in real time, has raised $5 million in...
Read moreMultiple providers say 'cloud data sprawl' makes managing cloud data risk a priority initiative within the next 12 months.
Read moreSafous Adds Browser Isolation to Its Zero-Trust Network Access Service
September 30 2022This new function offers secure access to corporate applications and external SaaS through a virtual browser.
Read moreIsrael Cybersecurity Enterprise (ICE) Teams with CybeReady to Deliver World-Class Security Training
September 30 2022Security service provider selects cybersecurity training platform to safeguard enterprises in LATAM.
Read moreAunalytics Launches Security Patching Platform as a Service
September 29 2022Expedited software patching and updating recognized as one of the most important processes to protect against system compromise from cyberattacks.
Read more
Recent Comments