Threat actors linked to the Black Basta ransomware may have exploited a recently disclosed privilege escalation flaw in the Microsoft Windows Error...
Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in Progress Software OpenEdge...
Some of you have already started budgeting for 2024 and allocating funds to security areas within your organization. It is safe to...
When it comes to cyber-attack and digital security issues, we often report incidents happening in the United States, Europe, and other first-world...
The probability that Lenovo has earned the infamous record for becoming a subject of the world’s biggest data breach in history is...
Security has been a major concern for everyone recently, especially for companies that use technology as the main component of their service...
Role-Based Access Control, or what is simply known as RBAC, provides the ability to restrict access to certain systems based on the...
Pulse Secure, with the cooperation of IDG Connect has released its 2019 State of Enterprise Secure Access research paper, detailing how cloud...
The Hong Kong Special Administrative Region in China, through its Privacy Commissioner, Stephen Kai-yi Wong has publicly disclosed a report containing more...
IT Security’s importance is absolute, regardless of whether the corporate decision makers agree or not. It is the foundation where company’s survivability...
Victoria’s public health system is “highly vulnerable” to a Singapore-like data breach, according to a recent report. As per an auditor general...
Email is the oldest service on the Internet, launched in the 1970’s, it is older than the WWW or the World Wide...
The New Zealand Financial Innovation & Technology Association (FinTechNZ), a financial-technology organization has exposed the alarming situation of companies based on New...
IT Services giant, Wipro Ltd which is headquartered in India has become the latest victim of spear phishing. According to the initial...
Here are the IT Security acronyms that you will like to know what it stands for in technology world. IT Security A...
Hackers see the healthcare industry as a lucrative target for hackers, why we say so is because we have seen this happening...
The legacy-dependence of the financial sector is very evident, many banks are still using legacy hardware and software to perform their day-to-day...
The public in the United States will no longer be able to access several Federal websites due to their expired HTTPS certificates....
2018 is becoming the year of cryptomining malware, a subtle virus compared to the very loud ransomware which dominated the 2017 malware...
Companies today have largely accepted that technology is here to stay, and not embracing it is not in the table. The white...
Human error has a lot to do with increased cybersecurity risks for any organization today, large or small. Even with reliable and...