Please turn on your JavaScript for this page to function normally.
Spring
Spring4Shell: New info and fixes (CVE-2022-22965)

In this video for Help Net Security, Ax Sharma, Senior Security Researcher at Sonatype, talks about the latest developments regarding Spring4Shell, the unauthenticated RCE …

Spring
Spring4Shell: No need to panic, but mitigations are advised

Security teams around the world got another shock on Thursday when news of disclosure of a PoC for an unauthenticated RCE zero-day vulnerability in Spring Core, a massively …

BYOD
BYOD and enterprise mobility market to reach $157.3 billion by 2026

Amid the COVID-19 crisis, the global market for BYOD and enterprise mobility estimated at $84.4 billion in the year 2022, is projected to reach a revised size of $157.3 …

snake, threat
Attackers employ novel methods to backdoor French organizations

An advanced threat actor has been spotted using distinctive, novel methods to backdoor French entities in the construction, real estate, and government industries. How the …

Microsoft Teams
Attackers use Microsoft Teams as launchpad for malware

Hackers are starting to realize that Microsoft Teams is a great means of spreading tentacles throughout an organization’s systems; since the start of the year, Avanan …

account
Microsoft: Enterprise MFA adoption still low

While two-factor authentication usage in the consumer space is climbing quickly, enterprises are still straggling when it comes to using multi-factor authentication (MFA) to …

work
Understaffing persistently impacting enterprise privacy teams

A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The …

hand
Attackers connect rogue devices to organizations’ network with stolen Office 365 credentials

Attackers are trying out a new technique to widen the reach of their phishing campaigns: by using stolen Office 365 credentials, they try to connect rogue Windows devices to …

U.S. Department of Labor (DOL)
Phishers go after business email credentials by impersonating U.S. DOL

Phishers are trying to harvest credentials for Office 365 or other business email accounts by impersonating the U.S. Department of Labor (DOL), Inky‘s researchers have …

certificate
Enterprise PKI automation: The modern approach to certificate lifecycle management

Today’s modern enterprises face massive surges in the use of digital identities, both for machines, (servers, laptops and network devices) and for the humans who use them. In …

DLP
Enterprise data loss prevention market to reach $6.265 billion by 2026

The global enterprise data loss prevention market is projected to grow at a CAGR of 21.03% to reach $6.265 billion by 2026, from $1.647 billion in 2019, according to …

collaboration
Finding the key for balancing remote workforce security with productivity

Unify Square released additional data from its report. This second wave of data centers on collaboration security and governance findings, and supports the need for better …

Don't miss

Cybersecurity news