SaaS in the Real World: Who’s Responsible to Secure this Data?
When SaaS applications started growing in popularity, it was unclear who was responsible for securing the data. Today, most security...
Category Added in a WPeMatico Campaign
When SaaS applications started growing in popularity, it was unclear who was responsible for securing the data. Today, most security...
The maintainers of OpenSSH have released OpenSSH 9.2 to address a number of security bugs, including a memory safety vulnerability...
An ongoing malvertising campaign is being used to distribute virtualized .NET loaders that are designed to deploy the FormBook information-stealing...
A new Android banking trojan has set its eyes on Brazilian financial institutions to commit fraud by leveraging the PIX...
VMware ESXi hypervisors are the target of a new wave of attacks designed to deploy ransomware on compromised systems. "These...
A zero-day vulnerability affecting Fortra's GoAnywhere MFT managed file transfer application is being actively exploited in the wild. Details of...
Two new security weaknesses discovered in several electric vehicle (EV) charging systems could be exploited to remotely shut down charging...
In a continuing sign that threat actors are adapting well to a post-macro world, it has emerged that the use...
The Iranian nation-state hacking group known as OilRig has continued to target government organizations in the Middle East as part...
Cybersecurity is quickly becoming one of the most significant growth drivers for Managed Service Providers (MSPs). That's the main insight...
F5 has warned of a high-severity flaw impacting BIG-IP appliances that could lead to denial-of-service (DoS) or arbitrary code execution....
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on February 2 added two security flaws to its Known Exploited Vulnerabilities...
The State Cyber Protection Centre (SCPC) of Ukraine has called out the Russian state-sponsored threat actor known as Gamaredon for...
Over the past few years, cybersecurity has become a major concern for businesses around the globe. With the total cost...
A new intelligence gathering campaign linked to the prolific North Korean state-sponsored Lazarus Group leveraged known security flaws in unpatched...