Tag
#auth
Small businesses are increasingly being targeted by cyberattackers. Why, then, are security features priced at a premium?
With every new third-party provider and partner, an organization's attack surface grows. How, then, do enterprises use threat intelligence to enhance their third-party risk management efforts?
Cybersecurity startup Zest Security emerged from stealth with an AI-powered cloud risk resolution platform to reduce time from discovery to remediation.
The threat group uses its "Stargazers Ghost Network" to star, fork, and watch malicious repos to make them seem legitimate, all to distribute a variety of notorious information-stealers-as-a-service.
The good news: Only organizations far behind on standard Windows patching have anything to worry about.
Prepay wireless provider TracFone has been slapped on the wrist to the tune of $16 million for insufficient customer data protection
Players can only access the game by first joining its Telegram channel, with some going astray in copycat channels with hidden malware.
SIM Wisuda version 1.0 suffers from an insecure direct object reference vulnerability.
SLiMS CMS version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Ubuntu Security Notice 6910-1 - Chess Hazlett discovered that Apache ActiveMQ incorrectly handled certain commands. A remote attacker could possibly use this issue to terminate the program, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS. Peter Stoeckli discovered that Apache ActiveMQ incorrectly handled hostname verification. A remote attacker could possibly use this issue to perform a person-in-the-middle attack. This issue only affected Ubuntu 16.04 LTS.