A recent vulnerability found in Palo Alto Networks’ PAN-OS has been added to the catalog of Known Exploitable Vulnerabilities from…
Blog
Security researchers have discovered over 80,000 Hikvision cameras vulnerable to a critical command injection flaw that’s easily exploitable via specially…
WordPress sites are being hacked to display fake Cloudflare DDoS protection pages to distribute malware that installs the NetSupport RAT and…
A hacker tracked as TA558 has upped their activity this year, running phishing campaigns that target multiple hotels and firms…
With the advent of remote work, companies – including those in legacy industries – have been forced to adopt SaaS…
Ransomware-as-a-Service is a new form of malicious and subscription-based business model involving the selling or renting of ransomware to buyers….
Mobile Malware Definition Mobile malware is malicious software specifically designed to target mobile devices, such as smartphones and tablets, with…
Healthcare providers, health plans and business associates must not let their guard down as the number of reported cybersecurity breaches…
Manufacturing organizations are in the middle of a major transformation thanks to the digitization of their operational technology (OT). This…
Today’s organizations understand the value of embracing technology and connectivity in almost every aspect of the business. But, just as…

