OMB Issues Zero-Trust Strategy for Federal Agencies
January 26 2022Federal officials tout the strategy as a more proactive approach to securing government networks.
Read moreFederal officials tout the strategy as a more proactive approach to securing government networks.
Read moreThe memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.
Read moreIt's not just your imagination — malicious threats have exponentially increased organizational risk.
Read moreAn elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shell
Read moreAn elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shell
Read moreThere’s a new ransomware that targets NAT devices made by QNAP:
The attacks started today, January 25th, with QNAP devices suddenly finding their files encrypted and file names appended...
Read more
Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups.
Read moreThe incident response landscape has changed drastically, largely from shifting attitudes among insurance companies and, to some extent, business customers feeling the pain of security incidents.
Read moreSupply chain account takeover is the most pressing issue facing email security today, but artificial intelligence can head off such attempts.
Read moreThe SOAR platform helps CISOs automate the security operations center via a low-code/no-code platform.
Read more
Recent Comments