The code injection vulnerability is being actively exploited in the wild, researchers say.
Read moreThe QNAP network-connected devices, used to store video surveillance footage, are a juicy target for attackers, experts warn.
Read moreMost of the attacks involve the use of automated exploits, security vendor says.
Read moreThe energy sector remains susceptible to both espionage between nation-states and cybercrime, and recent developments keep pointing toward more attacks.
Read moreThe stakes are high when protecting CNI from destructive malware and other threats.
Read moreTracking People via Bluetooth on Their Phones
June 17 2022We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research...
Read moreThough the once-popular browser is officially now history as far as Microsoft support goes, adversaries won't stop attacking it, security experts say.
Read moreBlastWave Announces Enhancements to Its Zero-Trust Security Software Solution, BlastShield
June 16 2022Update allows BlastShield users to link with hybrid cloud network providers like AWS, Google, and the most recent addition, Azure, in one secure environment.
Read moreSharePoint and OneDrive libraries can be encrypted in ransomware attack, researchers say.
Read moreWhat We Mean When We Talk About Cyber Insurance
June 16 2022Cyber insurance is more than a policy for paying off ransomware gangs. It's designed to be something you transfer risk to when security controls fail.
Read more
Recent Comments