CDM Featured Whitepapers

Managed File Transfer: What it is, how it works, and why you need it

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

Powerful Skygofree spyware was reported in November by Lukas Stefanko and first analyzed by CSE CybSec

The Skygofree spyware analyzed by Kaspersky today was first spotted by the researcher Lukas Stefanko…

Four malicious Chrome extensions affected over half a million users and global businesses

Four malicious Chrome extensions may have impacted more than half million users likely to…

Mirai Okiru botnet targets for first time ever in the history ARC-based IoT devices

Researcher @unixfreaxjp spotted the first time ever in the history of computer engineering a Linux…

Turla APT group’s espionage campaigns now employs Adobe Flash Installer and ingenious social engineering

Turla APT group’s espionage campaigns now employs Adobe Flash Installer and an ingenious social…

Lenovo spotted and fixed a backdoor in RackSwitch and BladeCenter networking switches

Lenovo discovered a firmware backdoor in RackSwitch and BladeCenter networking switch families during an internal…

CDM Available on Mobile Platforms in January 2018

You asked and we listened.  We’re thrilled to announce native mobile versions of Cyber…

January 2018 Patch Tuesday security updates fix a zero-day vulnerability in MS Office

Microsoft has released the January 2018 Patch Tuesday security updates, containing fixes for 56…

Microsoft: Meltdown and Spectre patches could cause noticeable performance slowdowns

Microsoft officially confirmed that Meltdown and Spectre patches could cause noticeable performance slowdowns contrary…

Spear phishing attacks already targeting Pyeongchang Olympic Games

Hackers are already targeting the Pyeongchang Olympic Games with spear phishing attacks aimed at…

Cyber Security Job Outlook for 2018 and Beyond

Cybersecurity is quickly becoming the most lucrative of careers in IT. As cyber threats…

Show Buttons
Hide Buttons