Chief information officers, chief technology officers, and technology leaders globally surveyed on key technology trends, priorities, and predictions for 2022…
Threat actors are hijacking Alibaba Elastic Computing Service (ECS) instances to install cryptominer malware and harness the available server resources…
The Dependency Combobulator is an open source Python-based toolkit that helps developers discover malicious software components that may have accidentally…
When Will Security Frameworks Catch Up With the New Cybersecurity Normal?
Standards need to reflect that most endpoints will be remote and/or wireless.
Researchers warn of severe risks from ‘Printjack’ printer attacks
A team of Italian researchers has compiled a set of three attacks called 'Printjack,' warning users of the significant consequences…
California Pizza Kitchen Suffers Data Breach
Personal data, including Social Security numbers, of more than 100K employees exposed.
Addressing the Low-Code Security Elephant in the Room
The danger of anyone being able to spin up new applications is that few are thinking about security. Here's why…
Artificial Intelligence and Machine Learning, Cloud Computing, and 5G Will Be the Most Important Technologies in 2022, Says New IEEE Study
Chief information officers, chief technology officers, and technology leaders globally surveyed on key technology trends, priorities, and predictions for 2022…
CISA Releases Incident and Vulnerability Response Playbooks to Strengthen Cybersecurity for Federal Civilian Agencies
Effort part of President Biden’s executive order to improve the nation’s sybersecurity.
Alibaba ECS instances actively hijacked by cryptomining malware
Threat actors are hijacking Alibaba Elastic Computing Service (ECS) instances to install cryptominer malware and harness the available server resources…
MSPAlliance Leadership Council Forms Vendor Council to Address Managed Services Supply Chain Risk
MSP supply chain threats will be mitigated through transparency, education, business continuity planning, and managed services channel certification.
New Application Security Toolkit Uncovers Dependency Confusion Attacks
The Dependency Combobulator is an open source Python-based toolkit that helps developers discover malicious software components that may have accidentally…
Researchers show that Apple’s CSAM scanning can be fooled easily
A team of researchers at the Imperial College in London have presented a simple method to evade detection by image…