News
-
Spring cleaning your data and cybersecurity practices — What small businesses need to know
As we usher in spring, it’s a great time for small businesses to do spring cleaning on their data and…
Read More » -
Top 5 cyber threats of Q1 2022
The first quarter of 2022 was marked by repeated ransomware strikes, geopolitical conflict and governmental action to protect users from…
Read More » -
Hackers compromise NFT Discord channels
Hackers have exploited a popular Discord bot to deceive users into clicking malicious links inside Discord servers of several popular…
Read More » -
New Bluetooth Hack Could Let Attackers Remotely Unlock Smart Locks and Cars
A novel Bluetooth relay attack can let cybercriminals more easily than ever remotely unlock and operate cars, break open residential…
Read More » -
U.S. warns against hiring North Korean IT staff
U.S. officials have warned businesses against hiring IT staff from North Korea. Rogue freelances are taking advantage of remote work…
Read More » -
Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover
Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites. A critical privilege escalation…
Read More » -
7 Key Findings from the 2022 SaaS Security Survey Report
The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the…
Read More » -
The time has come for a strategic electricity reserve
The Strategic Petroleum Reserve (SPR) has become a household phrase in recent months as the Biden administration has relied on…
Read More » -
High-Severity Bug Reported in Google’s OAuth Client Library for Java
Google last month addressed a high-severity flaw in its OAuth client library for Java that could be abused by a…
Read More » -
Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit
A new research published by academics from KU Leuven, Radboud University, and the University of Lausanne has revealed that users’…
Read More »