
Archive: News
Timeline


Companies are finally prioritizing OT security, and they need to
Cisco research shows a promising trend. OT security has long been neglected, but organizations are finally ca...

Lazarus hackers found entrance to the Windows kernel again
The infamous North Korean hacker gang Lazarus recently exploited a zero-day vulnerability in the Windows AFD....

‘Digital wallets susceptible to stolen credit card fraud’
Criminals can link stolen credit cards to digital wallets such as Apple Pay, Google Pay, and Paypal and make ...

Both Rubrik and Own have their eye on Salesforce data protection
Rubrik is now offering its own SaaS-based data protection for Salesforce. Meanwhile, Own also promises to saf...

VictoriaMetrics Cloud promises five times cheaper database monitoring
Those who need time-series monitoring in databases but have no appetite for setting up and maintaining the un...

MS Office apps for macOS allow circumventing of permissions
This makes code injection or even escalation of privileges possible

Swiss manufacturer Schlatter Industries recovered from cyber attack after 10 days
Update, Laura Herijgers, 20/08, 09:20 am: Schlatter Industries has been fully operational again since Monday....

Critical SolarWinds bug requires immediate patching due to active exploitation
Hackers are actively exploiting a critical vulnerability in SolarWinds' Web Help Desk software. This allows t...

Appian Platform 24.3 delivers AI with the strongest security requirements
The latest release of the Appian Platform focuses on AI that meets the strictest security requirements. Appia...