Is React2Shell the new Log4Shell?
A vulnerability in the ubiquitous logging software Log4j caused immediate turmoil when it was revealed at the...
A vulnerability in the ubiquitous logging software Log4j caused immediate turmoil when it was revealed at the...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
More and more companies are opting for the cloud. They often start by virtualizing their virtual machines in ...
Sophos informs Techzine that it has identified patterns used by hackers in Remote Desktop Protocol (RDP) attac...
Fujitsu reports that the company's PalmSecure technology, which can biometrically identify individuals, will b...
Eight million files are on the street due to a configuration error in the Elasticsearch database of AavGo, a c...
A study by MobileIron, the results of which are shared with Techzine, shows that eight out of ten IT managers ...
Trend Micro security researchers have found that hackers can use the iOS URL Scheme to launch attacks on certa...
Atlassian released a patch for a critical vulnerability in Jira Server. Via the vulnerability CVE-2019-11581 a...
Symantec has stopped the takeover talks with Broadcom. The two companies could not agree on the price, say ins...
Security company McAfee has issued a warning about a new Linux worm that attacks IoT devices such as tablets, ...
TrickBot, the malware discovered in 2016, has collected the passwords and address books of 250 million e-mail ...