April 27, 2022
Via: The Hacker NewsLog4Shell, ProxyShell, ProxyLogon, ZeroLogon, and flaws in Zoho ManageEngine AD SelfService Plus, Atlassian Confluence, and VMware vSphere Client emerged as some of the top exploited security vulnerabilities in 2021. That’s according to a “Top Routinely Exploited Vulnerabilities” report released by […]
April 21, 2022
Via: TechradarSeveral recent Google Chrome updates have been flagged as potentially harmful by Microsoft’s in-built antivirus and endpoint protection service, reports have claimed. A number of Windows system admin reports have shown that Microsoft Defender for Endpoint has been tagging browser […]
April 7, 2022
Via: Computer WeeklyThe Online Safety Bill is a landmark piece of legislation designed to lay down in law a set of rules about how online platforms should behave to better protect their customers and users. It aims to prevent the spread of […]
April 6, 2022
Via: TechSpotWhen enabled, Smart App Control uses AI and Microsoft’s cloud knowledge base to check every app that runs, blocking anything unsigned, unfamiliar, or known to be malicious. There is no whitelist, so blocked apps will only get through if their […]
February 15, 2022
Via: TechradarGoogle has issued a fix for a high-severity zero-day vulnerability in its Chrome browser which it claims is being abused in the wild. “Google is aware of reports that an exploit for CVE-2022-0609 exists in the wild,” the company’s security […]
January 3, 2022
Via: MashableBig results don’t always require a big effort. Maintaining your online and offline privacy can seem like a Herculean, or even Sisyphean, task. Never-before-heard-of companies with vaguely menacing names regularly brag about infringing upon it, and each day seems to […]
December 27, 2021
Via: Info WorldEarlier this month, security researchers uncovered a series of major vulnerabilities in the Log4j Java software that is used in tens of thousands of web applications. The code is widely used across consumer and enterprise systems, in everything from Minecraft, […]
December 7, 2021
Via: Info WorldAttacks on cloud-native infrastructures are on the rise. Research over a six-month period in 2021 shows a 26% increase in attacks on container environments over the previous six months. Malicious actors are targeting the auto-build process, packing the payloads, using […]
November 11, 2021
Via: TechradarA global survey of app security managers has revealed that a majority (91%) of the respondents had experienced security breaches in the last year as a direct result of a vulnerable application. Compiled by cybersecurity specialists Checkmarx, the report shares […]
November 1, 2021
Via: TechradarCybersecurity experts at Microsoft have warned against an increase in password spray attacks against cloud administrator accounts as well as high-profile identities such as C-level executives. Password spraying is a type of brute force attack where the attackers use commonly […]
November 1, 2021
Via: The Hacker NewsThere is often confusion between Cloud Access Security Brokers (CASB) and SaaS Security Posture Management (SSPM) solutions, as both are designed to address security issues within SaaS applications. CASBs protect sensitive data by implementing multiple security policy enforcements to safeguard […]
October 29, 2021
Via: TechradarFirefox is set to join the growing number of web browsers that are adding a “do not sell my personal data” signal referred to as global privacy control (GPC). GPC is implemented as a browser setting that sends a signal […]
October 7, 2021
Via: TechradarThe EU’s General Data Protection Regulation (GDPR), introduced three years ago brought the need for businesses to carefully safeguard personal data into the limelight. The regulation created a series of new responsibilities and obligations for organizations wishing to store and […]
September 9, 2021
Via: Computer WeeklySecurity analysts are once again warning of another zero-day vulnerability in Microsoft products after reports emerged of active exploitation of CVE-2021-40444, a remote code execution (RCE) vulnerability in the MSHTML component of Internet Explorer (IE) on Windows 10 and several […]
August 31, 2021
Via: MashableWhoa is what I kept thinking as I tried ProtonVPN, a Swiss-based VPN service that is dedicated to providing only privacy to all. When I first tried to use it on my Mac desktop, I began to be mysteriously logged […]
August 20, 2021
Via: Computer WeeklyWe all know data privacy does not exist in isolation. It is not a solitary indication of an enterprise’s morality and compliance, separated from the operations and lifeblood of the organisation. As an indication of this, we are beginning to […]
August 18, 2021
Via: The Hacker NewsA virtual private network (VPN) is the perfect solution for a lot of issues you might experience online- accessing blocked sites, hiding your browsing activity, getting rid of internet throttling, finding better deals, and much more. But does a VPN […]
August 17, 2021
Via: Computer WeeklyDigital applications and platforms have become an essential feature for organisations, even more so since the onset of the Covid-19 pandemic and subsequent restrictions imposed on the public. Organisations are moving swiftly towards building next-generation digital platforms to fuel digital […]
August 4, 2021
Via: TechradarA 12-year-old security vulnerability may be affecting routers built by “dozens of manufacturers”, exposing millions of users worldwide. According to researchers from security firm Tenable, the CVE-2021-20090 vulnerability made its way into modern routers due to the reusing of old […]
June 11, 2021
Via: The VergeAll of those obnoxious marketing emails that crowd your inbox aren’t just pushing a product. They’re also tracking whether you’ve opened the email, when you opened it, and where you were at the time by using software like Mailchimp to […]