March 2, 2023
Via: Tech RadarBot malware, where incidents automated malicious code capable of exfiltrating entire user profiles from target endpoints, are on the rise, a new report from NordVPN has warned. The company’s research claims that the data of five million people has been […]
Application security, Security
December 21, 2022
Via: TechRadarMicrosoft may have blocked macros from running by default in its Office suite of programs, but there are workarounds, researchers are saying. Several months after the ban was introduced, one specific workaround is seeing an uptick in adoption in the […]
November 23, 2022
Via: Help Net SecurityAs 5G connections are rapidly spreading, more and more questions and misconceptions are arising. What are the most common ones and how can they affect security teams? 5G is a comparatively new technology and many cybersecurity teams have not had […]
Threats & Malware, Vulnerabilities
September 19, 2022
Via: Help Net SecurityOxeye security researchers have uncovered several new high severity variants of the IDOR (Insecure Director Object Reference) vulnerabilities (CVE-2022-31671, CVE-2022-31666, CVE-2022-31670, CVE-2022-31669, CVE-2022-31667) in CNCF-graduated project Harbor, the popular open-source artifact registry by VMware. Harbor vulnerabilities Harbor is an open-source […]
August 15, 2022
Via: CSO OnlineThe short-video platform TikTok has come under fire in recent months. Both lawmakers and citizens in the U.S. have questioned its data collection practices and potential ties to the Chinese state. The concerns have deepened after Buzzfeed published a report […]
Application security, Security
September 23, 2021
Via: Help Net SecurityBusiness investment in SaaS applications continues to climb despite widespread underutilization of app licenses by employees. According to Productiv’s report, on average only 45% of company apps are being used on a regular basis. The data also shows 56% of […]
Threats & Malware, Vulnerabilities
February 24, 2021
Via: Computer WeeklyWhile the SolarWinds breach has shone a light on the dangers of supply chain attacks over the past three months, threat researchers at SME specialist security firm Huntress say the risks associated with the virtual events and conference platforms used […]
October 22, 2020
Via: Zone AlarmThis year with COVID, the American worker is working differently –as well as shopping, being entertained, and living differently. Part of that difference very likely involves conducting meetings virtually, with video conference platforms such as Zoom, Microsoft Teams, Skype, GoTo […]
June 23, 2020
Via: Threat PostThe sudden and massive shift to a work-from-home workforce has left millions of employees ill-prepared to handle the new cybersecurity challenges they face, a new study has found. Though many people had no previous work-at-home experience until this year, they […]
March 13, 2020
Via: Security IntelligenceAccording to the recent X-Force Threat Intelligence Index 2020, more than 8.5 billion records were exposed due to breaches in 2019, of which 86 percent were due to misconfigured assets. These issues affected only half of the records breached in […]
Threats & Malware, Vulnerabilities
March 4, 2020
Via: Security IntelligenceThe medical internet of things (IoT) is no longer a futuristic concept. It is here today, and it includes devices you may have never considered a part of the patient care ecosystem, such as elevators, beds, exit signs and clocks. […]
March 17, 2015
Via: application-securityMore than two-thirds (67 per cent) of organizations admit that unauthorized #cloud applications are being implemented without IT’s knowledge or involvement, and correspondingly pose a #security risk to the #business. This is according to a snapshot poll by Centrify at […]
April 11, 2024
March 21, 2024