We’re Thinking About SaaS the Wrong Way
September 26 2022Many enterprise applications are built outside of IT, but we still treat the platforms they're built with as point solutions.
Read moreMany enterprise applications are built outside of IT, but we still treat the platforms they're built with as point solutions.
Read moreSometimes browser spellcheckers leak passwords:
When using major web browsers like Chrome and Edge, your form data is transmitted to Google and Microsoft, respectively, should enhanced spellcheck features be...
Read more
Is this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?
Read moreThis one has chewed-up tentacles. (Note that this is a different squid than the one that recently washed up on a South African beach.) As usual, you can also use this...
Read moreSlack, Docker, Kubernetes, and other applications that allow developers to collaborate have become the latest vector for software supply chain attacks.
Read moreThe ongoing ad fraud campaign can be traced back to 2019, but recently expanded into the iOS ecosystem, researchers say.
Read moreA 36-year-old Russian man recently identified by KrebsOnSecurity as the likely proprietor of the massive RSOCKS botnet has been arrested in Bulgaria at the request of U.S. authorities. At...
Read moreThe bug allows unauthenticated code execution on the company's firewall products, and CISA says it poses "significant risk" to federal government.
Read moreCybercriminals took control of enterprise Exchange Servers to spread large amounts of spam aimed at signing people up for bogus subscriptions.
Read moreManufacturers need to document a medical device's intended use and operational environment, as well as plan for misuse, such as a cyberattack.
Read more
Recent Comments