Kubernetes usage is growing at pace as it becomes the first choice for both new and existing applications in production. | Continue reading
The Detectree open-source tool simplifies data analysis for blue teams to decrease response times, improve communication during an incident. | Continue reading
Microchip Technology announces its Precise Time Scale System, a timing system that is traceable to UTC and not dependent on GNSS. | Continue reading
Vulnerabilities (CVE-2022-29799, CVE-2022-29800) in the networkd-dispatcher daemon may be exploited to gain root on many Linux endpoints. | Continue reading
When it came to tracking Log4Shell, Qualys occupies a vantage point, since their Cloud Platform indexes 10 trillion data points. | Continue reading
A local EoP Windows vulnerability (CVE-2021-41379) that Microsoft supposedly fixed earlier this month is still exploitable. | Continue reading
The healthcare industry experienced devastating effects from DNS attacks during the COVID-19 pandemic, more so than other industries. | Continue reading
The White House has issued an open letter to private sector companies, urging them to do their part to stymie the ransomware threat. | Continue reading
32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. | Continue reading
Unauthorized access often goes unnoticed, and misconfigurations are common. 19% of organizations are unaware if unauthorized access occurred. | Continue reading
Microsoft has released security updates for zero-day vulnerabilities exploited by attackers to plunder on-premises Microsoft Exchange Servers. | Continue reading
CNAME cloaking evades anti-tracking measures on most widely-used browsers and introduces serious security and privacy issues. | Continue reading
Law enforcement and judicial authorities worldwide have effected a global takedown of the Emotet botnet, Europol announced today. | Continue reading
North America had 3.4 million 5G connections and over half a billion LTE connections, by the end of Q3 2020, according to 5G Americas. | Continue reading
There has been a 200 percent increase in BEC attacks focused on invoice or payment fraud from April to May 2020, according to Abnormal Security. | Continue reading
Researchers have discovered over 760 malicious Ruby packages typosquatting on RubyGems, the Ruby community’s gem repository / hosting service. | Continue reading
For the third time in a year, Google has fixed a Chrome zero-day (CVE-2020-6418) that is being actively exploited by attackers in the wild. | Continue reading
Less than a month after the patching of a critical RCE flaw in OpenSMTPD, a new, similar one has been revealed: CVE-2020-8794. | Continue reading
Many novice Office 365 (O365) shops do not know where platform-specific security vulnerabilities lie, or even that they exist. The threats that you are | Continue reading
HTTPS interception is controversial in the IT security community. There are two sides in this debate, and much depends on the setting you are in. | Continue reading
Offensive Security have released Kali Linux 2020.1, which is available for immediate download. Kali Linux 2020.1 key new features The popular open source | Continue reading
Only 9% can investigate an incident in 10 minutes and 11% of respondent organizations can detect intruders in under one minute. | Continue reading
Researchers have discovered 17 apps in Apple's App Store that contained a clicker module, designed to perform covert ad fraud-related tasks. | Continue reading
To uncover whether the world’s leading companies are committed to enhancing their cybersecurity initiatives, Bitglass researched the 2019 Fortune 500. | Continue reading
A new tool against online disinformation has been launched, called BotSlayer, developed by the Indiana University's Observatory on Social Media. | Continue reading
Risk Based Security reported today that VulnDB aggregated 11,092 vulnerabilities with disclosure dates during the first half of 2019. | Continue reading
A ransomware attack aimed at City Power, the electricity provider for Johannesburg, has resulted in some residents being temporarily without power. | Continue reading
For greater consumer acceptance of AI and for it to be more than just a buzzword, upfront transparency of data use is key. | Continue reading
It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not | Continue reading
Researchers are developing firmware hardening technologies for UEFI that will restrict what an attacker can do, even with code execution inside firmware. | Continue reading
German banks are moving away from SMS-based customer authentication and transaction verification (SMS-TAN), as the method is deemed to be too insecure. | Continue reading
Many people today use their additional monitor to stream music and watch sporting events and companies are struggling to cope with the extra bandwidth. | Continue reading
Password hashing is a one-way cryptographic transformation on a password, turning it into another string, called the hashed password. | Continue reading
Eenterprises must develop a runtime container security strategy capable of inspection of internal traffic in order to safeguard container environments. | Continue reading
Cybercriminals exposed 2.8 billion consumer data records in 2018, costing over $654 billion to U.S. organizations, according to ForgeRock. | Continue reading
Unbound Tech announced an industry first with news that Unbound Key Control received FIPS 140-2 Level 1 and Level 2 certification from the U.S. NIST. | Continue reading
Security can no longer be an afterthought. Like IoT devices, a standard or guidelines need to be established for securing satellites. | Continue reading
Researchers have solved a 15-year-old problem that allows handshake-style encryption to be used for time-delayed digital communications such as email. | Continue reading
Docker, the company behing the popular virtualization tool bearing the same name, has announced late on Friday that it has suffered a security breach. | Continue reading
Many pre-installed apps facilitate access to privileged data, without the average user being aware of their presence or being able to uninstall them. | Continue reading
Aviv Grafi, CEO at Votiro, talks about their Content Disarm and Reconstruction (CDR) technology for protection against cyber threats. | Continue reading
"Hydro subject to cyber-attack," warned Oslo-headquartered Norsk Hydro ASA, one of the world’s biggest aluminum producers. | Continue reading
More than half (55%) of PC applications installed worldwide are out-of-date, making PC users and their personal data vulnerable to security risks. | Continue reading
We think about botnets as a network of compromised machines, but Protego researchers say botnets can be easily be comprised of serverless functions. | Continue reading
While some organisations have migrated to Windows 10, many are lagging behind and are unprepared for Windows 7 end of life. | Continue reading
Drexel researchers develop spray-on antennas that perform as well as those being used in mobile devices, wireless routers and portable transducers. | Continue reading
The Wireshark team has plugged three Wireshark DoS vulnerabilities that could allow an unauthenticated, remote attacker to crash vulnerable installations. | Continue reading
Android users will soon be able to store their unencrypted WhatsApp backups on Google Drive without the backup being counted toward its storage quota. | Continue reading