No menu items!
No menu items!
More

    News

    Unified Identity – look for the meaning behind the hype!

    Feb 08, 2024The Hacker NewsUnified Identity / Cyber Security If you've listened to software vendors in the identity space lately, you will have noticed...

    Google Starts Blocking Sideloading of Potentially Dangerous Android Apps in Singapore

    Feb 08, 2024NewsroomData Protection / Mobile Securit Google has unveiled a new pilot program in Singapore that aims to prevent users from sideloading certain...

    Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products

    Feb 08, 2024NewsroomCyber Threat / Network Security Cisco, Fortinet, and VMware have released security fixes for multiple security vulnerabilities, including critical weaknesses that could...

    Critical JetBrains TeamCity On-Premises Flaw Exposes Servers to Takeover

    Feb 07, 2024NewsroomCybersecurity / Software Security JetBrains is alerting customers of a critical security flaw in its TeamCity On-Premises continuous integration and continuous deployment...

    After FBI Takedown, KV-Botnet Operators Shift Tactics in Attempt to Bounce Back

    The threat actors behind the KV-botnet made "behavioral changes" to the malicious network as U.S. law enforcement began issuing commands to neutralize the...

    Critical Bootloader Vulnerability in Shim Impacts Nearly All Linux Distros

    Feb 07, 2024NewsroomDevice Security / Vulnerability The maintainers of shim have released version 15.8 to address six security flaws, including a critical bug that...

    Global Coalition and Tech Giants Unite Against Commercial Spyware Abuse

    A coalition of dozens of countries, including France, the U.K., and the U.S., along with tech companies such as Google, MDSec, Meta, and...

    5 Steps to vCISO Success for MSPs and MSSPs

    Feb 07, 2024The Hacker NewsRisk Management / Cybersecurity 2024 will be the year of the vCISO. An incredible 45% of MSPs and MSSPs are...

    Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network

    Feb 07, 2024NewsroomCyber Espionage / Network Security Chinese state-backed hackers broke into a computer network that's used by the Dutch armed forces by targeting...

    Latest articles

    spot_imgspot_img