Threats

Cybersecurity Agencies Release Guidance for PowerShell Security

PowerShell is one of the most common tools used by hackers in "living off the land" attacks, when malicious actors use an organization's own tools against itself. This week, U.S. cybersecurity age...

Microsoft 365 Research Highlights Cloud Vulnerabilities

In a sequence that suggests cloud services may be more vulnerable than many think, Proofpoint researchers have demonstrated how hackers could take over Microsoft 365 accounts to ransom files stored o...

What is a Cyberattack? Types and Defenses

A cyberattack is any action taken by a cyber criminal in an attempt to illegally gain control of a computer, device, network, or system with malicious intent. Cyber criminals may damage, destroy, st...

Millions of MySQL Servers are Publicly Exposed

More than 3.6 million MySQL servers are publicly exposed on the internet, security researchers noted this week. Shadow Server Foundation researchers reported that they simply issued a MySQL c...

Microsoft Leads in Exploited Vulnerabilities; Office is Latest Target

With nearly $200 billion in annual sales, Microsoft is the world's largest software and information technology (IT) vendor, its products widely used by both companies and consumers. That also makes i...

Encryption: How It Works, Types, and the Quantum Future

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousand...

U.S. Agencies Ordered to Fix Critical VMware Vulnerabilities by Monday

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to fix critical vulnerabilities in VMware products by Monday or remove the products from service. Mult...

Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk

The Apache Log4j Log4Shell bug is one of the most critical vulnerabilities in the history of cybersecurity. Hundreds of millions of devices use the Log4j component for various online services, amo...

Software Supply Chain: A Risky Time for Dependencies

The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surf...

Critical F5 BIG-IP Flaw Actively Exploited by Hackers

User's of F5's BIG-IP application services could be vulnerable to a critical flaw that allows an unauthenticated attacker on the BIG-IP system to run arbitrary system commands, create or delete files...

Latest articles