Cloud breaches are inevitable — and so is cloud ransomware. (Second of two parts.)
Read moreClever Phishing Scam Uses Legitimate PayPal Messages
September 1 2022Brian Krebs is reporting on a clever PayPal phishing scam that uses legitimate PayPal messaging. Basically, the scammers use the PayPal invoicing system to send the email. The email lists...
Read moreClosing the Security Gap Opened by the Rise of No-Code Tools
August 31 2022No-code startups such as Mine PrivacyOps say they offer best of both worlds — quick development and compliance with privacy laws.
Read moreGoogle Fixes 24 Vulnerabilities with New Chrome Update
August 31 2022But one issue that lets websites overwrite content on a user's system clipboard appears unfixed in the new Version 105 of Chrome.
Read moreThe ongoing campaign is spreading worldwide, using the lure of a fully functional Google Translate application for desktops that has helped the threat stay undetected for months.
Read morePatch as soon as you can - that recent WebKit zero-day affecting new iPhones is apparently being used against older models, too.
Read morePatch as soon as you can - that recent WebKit zero-day affecting new iPhones is apparently being used against older models, too.
Read moreThe Pros and Cons of Managed Firewalls
August 31 2022Managed firewalls are increasingly popular. This post examines the strengths and weaknesses of managed firewalls to help your team decide on the right approach.
Read moreNew Golang cyberattacks use deep space images and a new obfuscator to target systems — undetected.
Read moreOpenText makes a $6 billion bet that bigger is better in security and that cybersecurity platform plays are the future.
Read more
Recent Comments