Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

CD Projekt Red game maker discloses ransomware attack

The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher, has disclosed a ransomware attack. The gaming firm CD Projekt Red, which developed popular…

Posted in Uncategorized | Tagged , , , , , , , | Comments Off on CD Projekt Red game maker discloses ransomware attack

5G Security

Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies   5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on 5G Security

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X