Security

bg
Microsoft Addresses 3 Zero-Days & 3 Critical Bugs for March Patch Tuesday

Microsoft Addresses 3 Zero-Days & 3 Critical Bugs for M...

The computing giant patched 71 security vulnerabilities in an uncharacteristical...

bg
The Uncertain Future of IT Automation

The Uncertain Future of IT Automation

While IT automation is growing, big challenges remain. Chris Hass, director of i...

bg
Bug in the Linux Kernel Allows Privilege Escalation, Container Escape

Bug in the Linux Kernel Allows Privilege Escalation, Co...

A missing check allows unprivileged attackers to escape containers and execute a...

bg
Massive Meris Botnet Embeds Ransomware Notes from REvil

Massive Meris Botnet Embeds Ransomware Notes from REvil

Notes threatening to tank targeted companies' stock price were embedded into the...

bg
Cyberattackers Leverage DocuSign to Steal Microsoft Outlook Logins

Cyberattackers Leverage DocuSign to Steal Microsoft Out...

A targeted phishing attack takes aim at a major U.S. payments company.

bg
The Art of Non-boring Cybersec Training–Podcast

The Art of Non-boring Cybersec Training–Podcast

With human error being the common factor in most cyberattacks, employee training...

bg
Cyberattackers Cook Up Employee Personal Data Heist for Meyer

Cyberattackers Cook Up Employee Personal Data Heist for...

The Conti gang breached the cookware giant's network, prepping thousands of empl...

bg
Kill Cloud Risk: Get Everybody to Stop Fighting Over App Security – Podcast

Kill Cloud Risk: Get Everybody to Stop Fighting Over Ap...

When it comes to ensuring safe cloud app rollouts, there’s flat-out animosity be...

bg
Critical VMware Bugs Open ESXi, Fusion & Workstation to Attackers

Critical VMware Bugs Open ESXi, Fusion & Workstation to...

A group of five security vulnerabilities could lead to a range of bad outcomes f...

bg
Cloud Security: The Forecast for 2022

Cloud Security: The Forecast for 2022

Stay ahead of learning what the emerging cloud trends are for defenders and atta...

bg
3 Tips for Facing the Harsh Truths of Cybersecurity in 2022, Part I

3 Tips for Facing the Harsh Truths of Cybersecurity in ...

Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, sha...

bg
LockBit, BlackCat, Swissport, Oh My! Ransomware Activity Stays Strong

LockBit, BlackCat, Swissport, Oh My! Ransomware Activit...

However, groups are rebranding and recalibrating their profiles and tactics to r...

bg
Argo CD Security Bug Opens Kubernetes Cloud Apps to Attackers

Argo CD Security Bug Opens Kubernetes Cloud Apps to Att...

The popular continuous-delivery platform has a path-traversal bug (CVE-2022-2434...

bg
Kronos Still Dragging Itself Back From Ransomware Hell

Kronos Still Dragging Itself Back From Ransomware Hell

And customers including Tesla, PepsiCo and NYC transit workers are filing lawsui...

bg
KP Snacks Left with Crumbs After Ransomware Attack

KP Snacks Left with Crumbs After Ransomware Attack

The Conti gang strikes again, disrupting the nom-merchant's supply chain and thr...

bg
Supply-Chain Security Is Not a Problem…It’s a Predicament

Supply-Chain Security Is Not a Problem…It’s a Predicament

Despite what security vendors might say, there is no way to comprehensively solv...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.