- Welcome Guest
- Sign In
New research from Atlas VPN shows that cloud-native exploits on major cloud service providers (CSPs) declined during the first four months of 2022. Cloud-native exploits dropped by 25%, from 71 exploits in the first four months of 2021 to 53 exploits in the first four months of this year.
Ransomware is the top supply chain risk facing organizations today, according to a new survey by ISACA, an association for IT professionals with 140,000 members in 180 countries. The survey, based on responses from more than 1,300 IT pros with supply chain insights, found that 73% of the respondents...
A “Zero Day” vulnerability in a Windows tool that hackers have been exploiting through poisoned Word documents has been discovered. Microsoft officially recognized the vulnerability and issued workarounds to mitigate the flaw.
Government organizations and educational institutions, in particular, are increasingly in hackers’ crosshairs as severe web vulnerabilities spiral upward. Remote code execution, cross-site scripting, and SQL injection are all top software offenders.
The director of cybersecurity at the National Security Agency induced a few smirks among cyber pros last week when he said there wouldn’t be any backdoors in the new encryption standards his agency is working on with the National Institute of Standards and Technology.
The social media platform for professionals was in the crosshairs of 52 percent of all phishing scams globally in the first quarter of 2022. This is the first time that hackers leveraged LinkedIn more often than any tech giant brand name like Apple, Google, and Microsoft.
Computer security only happens when software is kept up to date. That should be a basic tenet for business users and IT departments. Apparently, it isn’t. At least for some Linux users who ignore installing patches, critical or otherwise.
Research by a cybersecurity services provider reveals how widespread the risks are to executives and the organizations they ramrod from data brokers collecting sensitive data about them. "We see corporate executives targeted all the time in their personal lives," BlackCloak Founder and CEO Chris Pie...
Forrester also called out the work-from-anywhere trend as a major threat in 2022. It explained that an anywhere-work model presents an opportunity to create new kinds of sensitive data.
Security-minded internet users looking for another layer of obscurity when traveling in cyberspace can have it with some new tech from Atlas VPN. The paid VPN service has introduced a new way to route internet traffic that's more secure and private than conventional methods. It does that by allowing...
IT security firm NeoSystems last week announced it would host a panel of experts from the private and public sectors Tuesday centered around the cybersecurity implications of the ongoing conflict in Ukraine. TechNewsWorld sat in on the Zoom-delivered panel discussion.
The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.
This annual event is a most-popular time for betting pools and bracket challenges -- when employees often use websites, online platforms, or shared spreadsheets to organize. Hackers have countless ways to entice you to engage with them. These ruses include the promise of bigger winnings or insider i...
Internal documents recently leaked by a member of the Conti ransomware group reveal the gang's status as a multi-layered business organization. These chat logs present a deep dive into the gang's revenue numbers, leaders, recruiting practices and operations, and victims.