Researchers find critical RCE vulnerabilities in industrial VPN solutions
Critical vulnerabilities in several industrial VPN implementations for remotely accessing operational technology (OT) networks could allow attackers to overwrite data, execute …
62,000 QNAP NAS devices infected with persistent QSnatch malware
There are approximately 62,000 malware-infested QNAP NAS (Network Attached Storage) devices located across the globe spilling all the secrets they contain to unknown cyber …
How well do face recognition algorithms identify people wearing masks?
Now that so many of us are covering our faces to help reduce the spread of COVID-19, how well do face recognition algorithms identify people wearing masks? The answer, …
Review: Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism …
The distinction between human and bot behavior is becoming increasingly blurred
There’s no denying that the way people have been using the Internet and online stores has changed over the last couple of months. As consumers change their online habits, the …
What is privacy and why does it matter?
Privacy is a basic right and a necessary protection in the digital age to avoid victimization and manipulation. In much of the world, privacy is considered a basic human …
NIST selects algorithms to form a post-quantum cryptography standard
The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch. Post-quantum cryptography standard After spending …
75% of cardholders prefer contactless cards to other payment methods
Based on responses from 1,000 U.S. cardholders who are familiar with contactless credit/debit card or “tap and pay” technology, a new Entrust Datacard survey reveals that 75% …
CyberStrong platform updates allow customers to dynamically manage their risk posture
CyberSaint announced new updates to its flagship CyberStrong platform allowing customers to identify, measure, and dynamically manage IT and cybersecurity risks along the risk …
Sysdig Secure DevOps Platform offers onboarding, out-of-the-box dashboards and integrations
Sysdig announced a 5-minute setup for the Sysdig Secure DevOps Platform, a fast path to delivering container and Kubernetes security and visibility with a SaaS-first offering. …
Cloudflare releases Workers Unbound, a secure serverless computing platform
Cloudflare announced the release of Cloudflare Workers Unbound, offering a serverless platform for developers with unparalleled flexibility, performance, security, ease of …
Dragos and Fortinet partner to broaden cybersecurity across industrial networks
Dragos announced that through a partnership with Fortinet it has released an initial integration of the Dragos Platform with FortiSIEM, giving cyber defenders at industrial …
Featured news
Resources
Don't miss
- How AI is reshaping attack path analysis
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform