Cybersecurity Blog
Ransomware Attacks Impact 20% of Sensitive Data in Healthcare Orgs
Recent cyber incidents demonstrate the healthcare industry continues to be a prime target for ransomware hackers, ...
CISA Explains Why it Doesn’t Call Out Tech Vendors by Name
The CISA isn’t inclined to call out technology vendors when their fundamental errors impact customers — officials ...
Widely Used Telit Cinterion Modems Open to SMS-based Device Takeover Attacks
The vulnerabilities were found in the Cinterion EHS5-E series modem, but other Telit Cinterion products with similar ...
Regulators are Coming for IoT Device Security
Regulators are increasingly focusing on IoT device security due to the vulnerabilities present in many IoT devices. The ...
Citrix Warns Customers to Update PuTTY Version Installed on Their XenCenter System Manually
Versions of XenCenter for Citrix Hypervisor 8.2 CU1 LTSR used PuTTY, a third-party component, for SSH connections to ...
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively ...
What’s the Right EDR for You?
A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. ...
Malicious Android Apps Pose as Google, Instagram, WhatsApp, Spread via Smishing
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been ...