No menu items!
No menu items!
More

    THN

    Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager

    May 23, 2024NewsroomEndpoint Security / Vulnerability Ivanti on Tuesday rolled out fixes to address multiple critical security flaws in Endpoint Manager (EPM) that could...

    Achieve security compliance with Wazuh File Integrity Monitoring

    File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important...

    Microsoft Phases Out VBScript for JavaScript and PowerShell

    May 23, 2024NewsroomEndpoint Security / Data Privacy Microsoft on Wednesday outlined its plans to deprecate Visual Basic Script (VBScript) in the second half of...

    Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries

    Cybersecurity researchers have disclosed details of a previously undocumented threat group called Unfading Sea Haze that's believed to have been active since 2018. The...

    Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats

    May 22, 2024NewsroomICS Security / Vulnerability Rockwell Automation is urging its customers to disconnect all industrial control systems (ICSs) not meant to be connected...

    The Ultimate SaaS Security Posture Management Checklist, 2025 Edition

    Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was released three years ago, the corporate SaaS sprawl has...

    GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack

    Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable drivers to disable known security solutions (EDRs) and thwart detection in what's...

    MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks

    May 22, 2024NewsroomVulnerability / Data Breach An unknown threat actor is exploiting known security flaws in Microsoft Exchange Server to deploy a keylogger malware...

    Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings

    May 22, 2024NewsroomEncryption / Quantum Computing Popular enterprise services provider Zoom has announced the rollout of post-quantum end-to-end encryption (E2EE) for Zoom Meetings, with...

    Latest articles

    spot_imgspot_img