Ransomware & OneDrive: Attackers delete version backups
Proofpoint has potentially dangerous features of Microsoft Office…June 26, 2022 0 Comments
Vulnerabilities in the Siemens network management system
Team82 discovers 15 vulnerabilities in Siemens' network management system...June 24, 2022 0 Comments
Attacks on MS Office apps using homograph phishing
According to a new study by Bitdefender Labs,…June 22, 2022 0 Comments
Attack Surface Threat Report shows unmanaged attack surfaces
The Palo Alto Networks security research team has...June 20, 2022 0 Comments
Absolute Software Releases Findings from Latest IT Security Study: Increasing device mobility combined with the vulnerability of security controls underscores the need for robust…
A Trend Micro study examines the effects of cyber attacks on industrial systems. For German companies whose OT and control systems…
Trellix survey: According to a recent study, a lack of skilled workers endangers cyber security in 85% of all companies. Global survey of cybersecurity professionals reveals...
In the IoT Security Report 2022, IT experts call for a Bill of Materials (SBOM) for device software: industrial controls, production and the smart home...