Ransomware Attacks Impact 20% of Sensitive Data in Healthcare Orgs

Recent cyber incidents demonstrate the healthcare industry continues to be a prime target for ransomware hackers, ...

CISA Explains Why it Doesn’t Call Out Tech Vendors by Name

The CISA isn’t inclined to call out technology vendors when their fundamental errors impact customers — officials ...

Widely Used Telit Cinterion Modems Open to SMS-based Device Takeover Attacks

The vulnerabilities were found in the Cinterion EHS5-E series modem, but other Telit Cinterion products with similar ...

Regulators are Coming for IoT Device Security

Regulators are increasingly focusing on IoT device security due to the vulnerabilities present in many IoT devices. The ...

Citrix Warns Customers to Update PuTTY Version Installed on Their XenCenter System Manually

Versions of XenCenter for Citrix Hypervisor 8.2 CU1 LTSR used PuTTY, a third-party component, for SSH connections to ...

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability

Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively ...

What’s the Right EDR for You?

A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. ...

Malicious Android Apps Pose as Google, Instagram, WhatsApp, Spread via Smishing

Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been ...

1 210 211 212 213 214 215 216 217 218 219 220 661