Cyber criminals are targeting digital artists
Cyber criminals looking for a quick payout and valuables are targeting digital artists using NFTs (non-fungible tokens), warns security researcher Bart Blaze. The attackers …
How do I select an ITSM solution for my business?
An IT service management (ITSM) solution guarantees that IT processes and services are combined with the business goals of an organization, thus helping it thrive. To select a …
To identify cybersecurity vendor sustainability, start with the fundamentals
With $3.7 billion raised in cybersecurity funding so far this year, 2021 is on track to overcome last year’s record $7.8 billion total. Many of these companies have very high …
Why XSS is still an XXL issue in 2021
Cross-site scripting (XSS) attacks take advantage of coding flaws in the way websites or web applications generate input from users. Despite their longstanding reputation as a …
VPN attacks up nearly 2000% as companies embrace a hybrid workplace
Nuspire released a report which outlines new cybercriminal activity and tactics, techniques and procedures (TTPs) with additional insight from Recorded Future. “As companies …
Cloud computing costs skyrocketing as businesses support a remote workforce
Anodot announced the results of a survey that reveals how organizations struggle to control skyrocketing cloud computing costs of the remote workforce, even as business moves …
Top threats to consumer cyber safety
Norton Labs revealed the top cybersecurity trends from January to March 2021. Phishing campaigns remained the number one threat to consumer cyber safety, with top scams …
Vaccine passports challenged by data privacy and security implications
With the ongoing distribution of COVID-19 vaccines across the globe and the broader U.S. economy preparing to reopen, the question of international travel has become a topic …
How a conference room speakerphone might let attackers into your company network
Several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone could be exploited by attackers to eavesdrop on what’s being discussed in …
Ransomware attackers are leveraging old SonicWall SRA flaw (CVE-2019-7481)
Since the beginning of the year, various cyber attackers leveraged a slew of zero-day vulnerabilities to compromise different SonicWall solutions. Crowdstrike now warns that a …
Are your cyber defenses stuck in the sandbox?
Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions …
Investing in the right future for the cloud
In the last decade we have seen cloud technology evolve from a useful competitive business tool to one of the key foundations of the business world. Migrating assets, …