The first half of the year saw more than 11,800 reported security vulnerabilities, but figuring out which ones to patch first remains a thankless job for IT teams.
Read moreThe new GuardDuty Malware Protection and Amazon Detective were among 10 products and services unveiled at AWS re:Inforce in Boston this week.
Read moreWhy was PII belonging to nearly 1 billion people housed in a single, open database? Why didn't anyone notice it was downloaded?
Read moreHow to celebrate SysAdmin Day!
July 29 2022I've just popped in to wish you all/The best SysAdmin Day!
Read moreMicrosoft Zero-Days Sold and then Used
July 29 2022Yet another article about cyber-weapons arms manufacturers and their particular supply chain. This one is about Windows and Adobe Reader zero-day exploits sold by an Austrian company named DSIRF. There’s...
Read moreThe campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.
Read more3 Tips for Creating a Security Culture
July 29 2022Trying to get the whole organization on board with better cybersecurity is much tougher than it may sound.
Read more3 Tips for Creating a Security Culture
July 29 2022Trying to get the whole organization on board with better cybersecurity is much tougher than it may sound.
Read moreBreach Exposes Users of Microleaves Proxy Service
July 28 2022Microleaves, a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, exposed their entire user database and the location of tens of...
Read moreAttackers almost immediately leapt on a just-disclosed bug, CVE-2022-26138, affecting Atlassian Confluence, which allows remote, unauthenticated actors unfettered access to Confluence data.
Read more
Recent Comments