Please turn on your JavaScript for this page to function normally.
Citrix
Attackers exploiting critical Citrix ADC, Gateway flaw, company yet to release fixes

Nearly a month has passed since Citrix released mitigation measures for CVE-2019-19781, a critical vulnerability affecting Citrix Application Delivery Controller and Citrix …

Firefox
Mozilla patches actively exploited Firefox zero-day

Mozilla has patched a Firefox zero-day vulnerability (CVE-2019-17026) that is being exploited in attacks in the wild and is urging Firefox and Firefox ESR users to update …

IoT
California’s IoT cybersecurity bill: What it gets right and wrong

California state lawmakers should be lauded for SB 327, their well-intentioned legislative attempt at tackling one of the most pressing issues in the tech sector: IoT …

5G
When do you plan to upgrade to 5G?

The smartphone will remain the dominant consumer device into the new decade, but the arrival of 5G will not guarantee a surge in device upgrades, according to a GSMA …

hand
eBook: How Hackers Plan Their Attacks

Being the good guys, we think about how to protect ourselves from cyberattacks. But have you ever tried thinking like hackers planning their next attack? BitDam founders used …

Google Play malware
App on Google Play exploited Android bug to deliver spyware

Google has pulled three malicious apps from Google Play, one of which exploits a recently patched kernel privilege escalation bug in Android (CVE-2019-2215) to install the app …

Travelex
Travelex extorted by ransomware gang, services still offline a week after the hit

On the last day of 2019, foreign exchange company Travelex was hit by cyber attackers wielding the Sodinokibi (aka REvil) ransomware. More than a week later, the …

MITRE ATT&CK
ATT&CK for ICS: Knowledge base of techniques used by cyber adversaries

MITRE released an ATT&CK knowledge base of the tactics and techniques that cyber adversaries use when attacking ICS that operate some of the nation’s most critical …

USA
Why the 2020 US presidential election is still vulnerable to foreign interference

With the international political situation becoming increasingly fraught and divisive, it is hard to ignore the shadow of foreign interference looming over electoral …

city
Smart cities are on the rise, what are the dangers?

A combination of job prospects, local amenities and other attractions is drawing more people to city living than ever before. Indeed, the UN estimates that by 2050 two-thirds …

World
Trends that will shape the 2020 technology market

In 2020, there will be greater adoption of Continuous Intelligence (CI) technologies, which will elevate IoT data analytics way beyond traditional operational levels and have …

Windows 7
Are you ready for the end of Windows 7 support?

Windows 7 support will end on January 14, 2020. From a security perspective, security patches will not be available. Cynet 360 autonomous breach protection is a good example …

Don't miss

Cybersecurity news