Cybersecurity Blog
Getting off the Attack Surface Hamster Wheel: Identity Can Help
IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to ...
SEC Twitter Hacked to Push Fake News of Bitcoin ETF Approval
The incident highlights concerns over the security of the SEC’s social media accounts and the need for better ...
British Library: Finances are Healthy Amid Cyber Rebuild
The British Library has refuted reports that the recovery costs for its recent ransomware attack will reach nearly $9 ...
Free Decryptor Released for Black Basta and Babuk’s Tortilla Ransomware Victims
Jan 10, 2024NewsroomRansomware / Data Security A decryptor for the Tortilla variant of the Babuk ransomware has been ...
CISA Flags 6 Vulnerabilities – Apple, Apache, Adobe , D-Link, Joomla Under Attack
Jan 10, 2024NewsroomPatch Management / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency ...
Microsoft January 2024 Patch Tuesday Fixes 49 Flaws, 12 RCE Bugs
Microsoft’s January 2024 Patch Tuesday includes security updates for 49 flaws and 12 remote code execution ...
Twilio Will Discontinue its Authy Desktop 2FA App in August, Goes Mobile Only
Users are recommended to switch to the mobile versions available on iOS and Google Play. The decision to sunset the ...
SQLi vulnerability in Cacti could lead to RCE (CVE-2023-51448) – Help Net Security
A blind SQL injection vulnerability (CVE-2023-51448) in Cacti, a widely-used network monitoring, performance and fault ...