Why did so many security vendors abandon MITRE’s stresstest?
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
A new form of spyware has been discovered in an Android SDK. The software development kit (SDK) has been used...
ESET reports that an Android app was secretly spying on its users. iRecorder - Screen Recorder introduced mal...
Hackers have given the formerly popular hacker forum RaidForums a post-mortem exposé akin to the old forum's...
A preview version of Windows 11 on Arm now includes Endpoint Data Loss Protection (DLP) policy options. This ...
The latest action by China is seen as a reaction to trade restrictions imposed by the US last year. Commer...
Hackers are using encrypted Restricted Permission Message (RPMSG) files via compromised Microsoft 365 account...
WithSecure has enhanced its existing WithSecure Elements endpoint security platform with a Cloud Security Pos...
New research by Veeam shows that attacks almost always (93%) target backups. That way, they try to force pay...
Google has introduced what it calls the "Mobile Vulnerability Rewards Program". The tech giant intends for th...
Chinese researchers have cracked the fingerprint security of Android phones through a brute-force attack: Bru...