Applications

25 Most Dangerous Software Vulnerabilities & Flaws Identified by MITRE

MITRE has released its latest list of the top 25 most exploited vulnerabilities and exposures found in software. The MITRE CWE list is different from the product-specific CVE lists from the U.S. C...

CISA Urges Exchange Online Authentication Update

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is recommending that government agencies and private organizations that use Microsoft's Exchange cloud email platform migrate users an...

Kubernetes Security Issues: Nearly a Million Instances Exposed on Internet

Cybersecurity researchers have found more than 900,000 instances of Kubernetes consoles exposed on the internet. Cyble researchers detected misconfigured Kubernetes instances that could expose hun...

Cybersecurity Agencies Release Guidance for PowerShell Security

PowerShell is one of the most common tools used by hackers in "living off the land" attacks, when malicious actors use an organization's own tools against itself. This week, U.S. cybersecurity age...

Microsoft 365 Research Highlights Cloud Vulnerabilities

In a sequence that suggests cloud services may be more vulnerable than many think, Proofpoint researchers have demonstrated how hackers could take over Microsoft 365 accounts to ransom files stored o...

How to Prevent Software Supply Chain Attacks

Software supply chain attacks present an increasingly worrying threat. According to a recent BlueVoyant study, an impressive 97 percent of companies surveyed have been negatively impacted by a securi...

Millions of MySQL Servers are Publicly Exposed

More than 3.6 million MySQL servers are publicly exposed on the internet, security researchers noted this week. Shadow Server Foundation researchers reported that they simply issued a MySQL c...

New Open-source Security Initiative Aimed at Supply Chain Attacks

Open source software libraries are frequent targets of hackers, who see them as an attractive path for stealing credentials and distributing malware. Hundreds of thousands of software project...

Encryption: How It Works, Types, and the Quantum Future

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousand...

Top SD-WAN Solutions for Enterprise Security

The development of software-defined wide area networking (SD-WAN) has given enterprise administrators flexibility akin to virtualization to manage distributed networks and users globally. Wide...

Latest articles