16.8 C
Johannesburg

AA20-010A: Continued Exploitation of Pulse Secure VPN Vulnerability

Original release date: January 10, 2020SummaryUnpatched Pulse Secure VPN servers continue to be an attractive target for malicious actors. Affected organizations that have not applied the software patch to...

AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

Original release date: January 6, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) is sharing the following information with the cybersecurity community as a primer for assisting in the protection...

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise. Read more

Top Zero Days, Data Breaches and Security Stories of 2019: News Wrap

From ransomware ramp up, to voice assistant privacy perils, the Threatpost team breaks down the top news stories from this past year. Read more

It’s Time for Your SOC to Level Up

Artificial intelligence can provide manpower, context and risk assessment. Read more

Apple’s Bug Bounty Opens for Business, $1M Payout Included

The tech giant is looking for full working exploits with any vulnerability submission. Read more

Cloud migration strategy: How to build a team of experts

In order to pull off a cloud migration successfully you will need a team of experts. Here is a look at the roles you need to on your enterprise...

Birth Certificate Data Laid Bare on the Web in Multiple States

A platform that allows online applications for copies of birth certificates did not store its data properly. Read more

AT&T, Verizon Subscribers Exposed as Mobile Bills Turn Up on the Open Web

Names, addresses, phone numbers, call and text message records and account PINs were all caught up in a cloud misconfiguration. Read more

How IBM plans to compete in the cloud

IBM hopes to reduce the complexity of moving workloads to the cloud through Cloud Paks,’ its series of specialized packaged offerings that enterprise can implement relatively quickly. But is...

Latest article

Framework Developer ‘Ragequits’ Open Source Community, Citing Negative Comments, ‘Very Few Provide Help’

The maintainer of the popular Rust web framework Actix has quit the project -- though he's backed off threats to make its code private...

EFF Defends Bruce Perens Victory Against ‘Open Source Security’ in Appeals Court

Bruce Perens (Slashdot reader #3872) co-founded the Open Source Initiative with Eric Raymond in 1998. (And then left it this January 2nd.) But in...

Realtek SDK Information Disclosure / Code Execution

Realtek SDK based routers suffer from information disclosure, incorrect access control, insecure password storage, code execution, and incorrectly implemented CAPTCHA vulnerabilities. Read more