No menu items!
No menu items!
More

    News

    Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats

    May 22, 2024NewsroomICS Security / Vulnerability Rockwell Automation is urging its customers to disconnect all industrial control systems (ICSs) not meant to be connected...

    The Ultimate SaaS Security Posture Management Checklist, 2025 Edition

    Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was released three years ago, the corporate SaaS sprawl has...

    GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack

    Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable drivers to disable known security solutions (EDRs) and thwart detection in what's...

    MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks

    May 22, 2024NewsroomVulnerability / Data Breach An unknown threat actor is exploiting known security flaws in Microsoft Exchange Server to deploy a keylogger malware...

    Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings

    May 22, 2024NewsroomEncryption / Quantum Computing Popular enterprise services provider Zoom has announced the rollout of post-quantum end-to-end encryption (E2EE) for Zoom Meetings, with...

    QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances

    May 22, 2024NewsroomData Security / Vulnerability Taiwanese company QNAP has rolled out fixes for a set of medium-severity flaws impacting QTS and QuTS...

    Critical Veeam Backup Enterprise Manager Flaw Allows Authentication Bypass

    May 22, 2024NewsroomEnterprise Security / Vulnerability Users of Veeam Backup Enterprise Manager are being urged to update to the latest version following the discovery...

    Critical GitHub Enterprise Server Flaw Allows Authentication Bypass

    May 21, 2024NewsroomVulnerability / Software Development GitHub has rolled out fixes to address a maximum severity flaw in the GitHub Enterprise Server (GHES) that...

    Streamlining IT Security Compliance Using the Wazuh FIM Capability

    File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important...

    Latest articles

    spot_imgspot_img