Articles
    January 21, 2022

    10 data privacy ‘manager-approved’ best practices

    Businesses collect a mind-bogglingly large amount of data everyday and implementing a comprehensive data privacy…
    Vulnerabilities
    January 21, 2022

    McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges

    McAfee has patched two high-severity bugs in its Agent component, one of which can allow…
    News
    January 21, 2022

    20K WordPress Sites Exposed by Insecure Plugin REST-API

    The WordPress WP HTML Mail plugin for personalized emails is vulnerable to code injection and…
    News
    January 21, 2022

    Cybersecurity institute trains Texas cyber talent

    The North East Independent School District in San Antonio, Texas (NEISD) has opened the Institute…
    Videos
    January 21, 2022

    Comelec, iniimbestigahan na ang sinasabing hacking sa kanilang sistema | 24 Oras

    Iniimbestigahan na nga ng Comelec ang sinasabing hacking sa kanilang sistema. Gayunpaman, iginiit din ng…
      News
      January 21, 2022

      Cisco Issues Patch for Critical RCE Vulnerability in RCM for StarOS Software

      Cisco Systems has rolled out fixes for a critical security flaw affecting Redundancy Configuration Manager (RCM) for Cisco StarOS Software…
      News
      January 21, 2022

      Jon France named CISO at (ISC)²

      (ISC)² appointed Jon France, CISSP, as its first chief information security officer (CISO). In this role, France will report directly…
      Videos
      January 21, 2022

      News About Cyber Attacks is Fake, State Bank of Pakistan

      News About Cyber Attacks is Fake, State Bank of Pakistan SBP rejects rumours of cyber attack on several banks SBP…
      News
      January 21, 2022

      7 trends shaping cybersecurity communications in 2022

      As high-profile cyberattacks continue with increasing frequency, one of the biggest challenges facing cybersecurity communications professionals in the next year…
      Back to top button