A recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but which companies are most affected, and in what ways?
Read moreMalicious ISS module exploitation is the latest trend among threat actors targeting Exchange servers, analysts say.
Read moreStudy Reveals Traditional Data Security Tools Have a 60% Failure Rate Against Ransomware and Extortion
June 30 2022Titaniam’s ‘State of Data Exfiltration & Extortion Report’ also finds that while over 70% of organizations had heavy investments in prevention, detection, and backup solutions, the majority of victims...
Read moreA password link that didn't expire leads to the discovery of exposed personal information at a payments service.
Read moreNXM Announces Platform That Protects Space Infrastructure and IoT Devices From Cyberattacks
June 30 2022NXM Autonomous Security protects against network-wide device hacks and defends against critical IoT vulnerabilities.
Read moreA password link that didn't expire leads to the discovery of exposed personal information at a payments service.
Read moreCritical ManageEngine ADAudit Plus Vulnerability Allows Network Takeover, Mass Data Exfiltration
June 30 2022An unauthenticated remote code execution vulnerability found in Zoho’s compliance tool could leave organizations exposed to an information disclosure catastrophe, new analysis shows.
Read moreThere were a record number of zero-day attacks last year, but some basic cyber-hygiene strategies can help keep your organization more safe.
Read moreLatest episode - listen and read now! Use our advice to advise your own friends and family... let's all do our bit to stand up to scammers!
Read moreMicrosoft is urging organizations that don't have automatic updates enabled to update to the latest version of Linux Server Fabric to thwart the "FabricScape" cloud bug.
Read more
Recent Comments