Please turn on your JavaScript for this page to function normally.
eSentire report
Download: eSentire Q1 2019 Quarterly Threat Report

The eSentire Q1 2019 Quarterly Threat Report provides a snapshot of threat events and trends investigated by the eSentire Security Operations Center (SOC) in January, February …

alert
Google launches Chrome extension for reporting suspicious sites

Google has announced two new features aimed at protecting users from deceptive and malicious websites: A new type of warning that will direct users away from sites that have …

Tesla
Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks

Tesla Model S and Model 3 electric cars are vulnerable to cyberattacks aimed at their navigation systems, according to research from Regulus Cyber. Staged attack caused the …

Firefox
Mozilla plugs critical Firefox zero-day used in targeted attacks

A critical Firefox zero-day remote code execution vulnerability is being abused in targeted attacks in the wild, Mozilla has warned on Tuesday. About the vulnerability …

Oracle
Another Oracle WebLogic Server RCE under active exploitation

Oracle has released an out-of-band fix for CVE-2019-2729, a critical deserialization vulnerability in a number of versions of Oracle WebLogic Server, and is urging customers …

person
Regulation readiness: Embracing the privacy legislation wave ahead

There are a few certainties in life. Your attempt to use the fifteen-item express checkout line with sixteen items will be denied by the seventeen-year-old cashier. The …

CEO
Executives now recognize cybersecurity as a key business driver

Cybersecurity is now recognized as a key business driver by the C-Suite, according to a new Radware report. Executives that participated in the survey found that the four main …

mobile device
Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps

Recently messaging applications got hit hard with vulnerabilities, hacking attempt disclosures by nation-states and insider employee inappropriate behaviors. As organizations …

Password
Insecure password memory aids: A passwordless future could be the solution

There is a readiness for passwordless security methods such as biometrics, with 70% workers believing biometrics would benefit the workplace, according to Okta. The …

architecture
Organizations more likely to accelerate business when protecting their cloud data

Cloud services are the most significant advance in IT since the introduction of the internet itself, and most organizations today benefit from the collaboration, scalability …

5G
GSMA disproves false claims 5G systems will harm other services

The mobile industry has already demonstrated within leading international standards bodies that 5G can be used safely alongside other services, including weather sensing …

Linux
SACK TCP flaws can crash, slow down Linux-based systems

An engineering manager at Netflix has unearthed several TCP networking vulnerabilities in Linux and FreeBSD kernels that could lead to systems crashing or consuming too many …

Don't miss

Cybersecurity news