Email is one of the largest communication methods available, so it is no wonder it’s among the favorite attack vectors to target. Organizations rely on
These days, any mention of cybersecurity solutions will inevitably lead to a conversation involving artificial intelligence (AI). That’s because the
Germany’s national Computer Emergency Response Team (CERT Bund) has issued a security alert for a critical vulnerability in the VLC Media Player.
Atlassian issued a critical security advisory for several programs used in conjunction with the company’s Jira server and Data Center products.
Drupal released two critical security updates that could be exploited allowing an attacker to take control of an affected system.
Over the past decade, technology giants like Microsoft, Google and Apple have been raging an all-out war against the use of passwords with new
These days, not a week goes by where we don’t read about a breach. Recently, it was genealogy service MyHeritage exposing login credentials of almost all
While hackers are certainly investing in new tools and methods, they are also relying on old tricks to gain a foothold in enterprise defenses.
Security practitioners face so many trials and tribulations as they protect and defend their organizations. In order to seek the best possible protection,
Hey guys! I have a quick and easy project for you, today, that would make a great Father’s Day gift and it’s easy enough that the kids could help! I was able to
Cybersecurity professionals have a unique opportunity to make the world a safer place. Our work protects important economic and public interests from real
Cisco has revealed a critical-rated vulnerability in its small business switches software that if exploited can allow a remote attacker to bypass the device’s user authentication mechanism.
What are the common perils and pitfalls CISOs should consider when investing in corporate application security and Application Security Testing (AST)?
Microsoft’s Patch Tuesday entry for March feature 18 critical security updates, out of 64 overall, all of which can lead to remote code execution if exploited and two of which are active in the wild.
Threat actors are constantly evolving and advancing their attacks. Organizations seek to gain context on these attacks by leveraging threat intelligence,
VMware issued a security update for Workstation and Fusion, patching a critical bug that, if exploited, could allow guests to execute code on the host.
By Joe Merces So you’ve moved your infrastructure to the Amazon Web Services cloud. What a relief, right? No more worries about the security of your
In August 2018, security researchers announced that cybercriminals were successfully bypassing Office 365's Advanced Threat Protection via a new evolution
It’s the law…almost 2018 may go down as the year the EU’s GDPR went into effect but legislators domestically kept busy introducing and passing legislation
Cisco Talos researchers discovered 11 vulnerabilities in the CUJO Smart Firewall platform.
By Rags Srinivasan, senior director, growth verticals, Seagate Technology The growth of data’s influence on our personal and business lives over the past
Copyright © 2011-2019 Hubbiz®
| Contact Hubbiz