Attackers Can Compromise Most Cloud Data in Just 3 Steps
September 13 2022An analysis of cloud services finds that known vulnerabilities typically open the door for attackers, while insecure cloud architectures allow them to gain access to the crown jewels.
Read moreAttackers Can Compromise Most Cloud Data in Just 3 Steps
September 13 2022An analysis of cloud services finds that known vulnerabilities typically open the door for attackers, while insecure cloud architectures allow them to gain access to the crown jewels.
Read moreFBI Seizes Stolen Cryptocurrencies
September 13 2022The Wall Street Journal is reporting that the FBI has recovered over $30 million in cryptocurrency stolen by North Korean hackers earlier this year. It’s only a fraction...
Read moreHow Machine Learning Can Boost Network Visibility for OT Teams
September 12 2022Opswat says its new tool uses neural networks to protect critical environments through AI-assisted asset discovery, network visibility, and risk management.
Read moreApple patches a zero-day hole – even in the brand new iOS 16
September 12 2022Five updates, one upgrade, plus a zero-day. Patch your Macs, iPhones and iPads as soon as you can (again)...
Read moreGoogle Releases Pixel Patches for Critical Bugs
September 12 2022Unpatched Pixel devices are at risk for escalation of privileges, Google warns.
Read moreThe American Data Privacy and Protection Act would provide federal-level protections that don't exist in most states, but override existing, stronger state protections.
Read moreCisco Data Breach Attributed to Lapsus$ Ransomware Group
September 12 2022Analysis shows attackers breached employee credentials with voice phishing and were preparing a ransomware attack against Cisco Systems.
Read more
Recent Comments