Cybersecurity Blog
PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions
Jan 17, 2024NewsroomFinancial Data / Vulnerability The point-of-sale (PoS) terminals from PAX Technology are impacted ...
Combating IP Leaks into AI Applications with Free Discovery and Risk Reduction Automation
Wing Security announced today that it now offers free discovery and a paid tier for automated control over thousands of ...
Adalanche: Open-source Active Directory ACL visualizer, explorer – Help Net Security
Adalanche provides immediate insights into the permissions of users and groups within an Active Directory. It’s an ...
PixieFail Vulnerabilities Impact PXE Network Boot in Enterprise Systems
The flaws affect Tianocore’s EDK II UEFI implementation and other major tech companies and BIOS providers, ...
Email Nightmare: 94% of Firms Hit by Phishing Attacks in 2023
Email security remained top of mind for cybersecurity professionals in 2023 as over nine in ten (94%) cyber ...
Known Indicators of Compromise Associated with Androxgh0st Malware | CISA
SUMMARY The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are ...
Southeast Asian casino industry supercharging cyber fraud, UN says
The expanding Southeast Asian casino industry has become the nexus of the region’s criminal ecosystem, including its ...
Ransomware gang demands €10 million after attacking Spanish council
The mayor of Calvià, a municipality on the Spanish island of Majorca, has said the city council will not be paying an ...