It’s Time to Issue Company Passwords Again
By Rob Cheng, Founder and CEO, PC Matic The recent PC Matic Password Hygiene & Habits Report found that only 16% of employers issue passwords to employees. This is an…
Cybersecurity in Healthcare: Benefits, Examples, and Usage Tips Healthcare cybersecurity framework
By Kate Orekhova, Cleveroad company Health organizations deal with a large amount of sensitive personal information. That’s why they face challenges complying with tightening regulations, and they’re constantly combating increased…
New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.
By Jeremy Thomas, GitGuardian CEO When we started working on GitGuardian’s detection algorithm and got the first detection results, we could not believe it. We were facing a very counterintuitive…
These 2 attacks allow to alter certified PDF Documents
Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature. Researchers from Ruhr-University Bochum have disclosed two new attack techniques,…
New Epsilon Red Ransomware appears in the threat landscape
Researchers spotted a new piece of ransomware named Epsilon Red that was employed at least in an attack against a US company. Researchers from Sophos spotted a new piece of…
5 Tips to Building a Cyber-Smart Culture
Building a strong cybersecurity culture in your organization is not only possible, it’s a necessity. With cyberattacks spanning critical infrastructure, SMBs, retail organizations, and commercial businesses alike, addressing cybersecurity with…
A dozen Android apps exposed data of 100M+ users
Check Point researchers found 23 Android apps that exposed the personal data of more than 100 million users. Security researchers from Check Point have discovered 23 Android applications that exposed…
Identity crisis? It’s time to take the holistic approach.
In planning for a secure future hybrid working reality, many IT leaders have reconsidered how they manage the identities on their network. Their workforce now uses new systems and devices,…
Most of Exim email servers could be hacked by exploiting 21Nails flaws
The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers to fully compromise mail servers. The maintainers of the Exim…
China-linked APT uses a new backdoor in attacks at Russian defense contractor
China-linked APT group targets Russian nuclear sub designer with an undocumented backdoor A China-linked cyberespionage group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy….
Why cybersecurity is a driver for commercial success in 2021
By Laurent Celerier, EVP Technology & Marketing There is no question that COVID-19 has had far reaching and long-lasting impacts on the way people do things, not least the way…
Patchstack Protects The Web With Community
By Oliver Sild, the co-founder and CEO of Patchstack Web applications today are built with heavy use of open source code – all of which is largely put together by…