Top

LATEST PUBLICATIONS



Coordinated Ransomware Attack Hits 23 Texas Government Agencies

August 19, 2019

Category: Malware

Up to 23 Texas entities – the majority of which are local governments – were hit by a ransomware attack on Friday that Texas officials say is part of a targeted attack launched by a single threat actor. Details remain […]


Protecting your organization against privileged identity theft

August 14, 2019

What do the top data breaches of the 21st century have in common? Privileged identity abuse. In these breach instances, well-resourced, external actors were able to gain the credentials of users with access to privileged accounts – such as administrative, […]


Only 32% of government organizations consider a cloud-first strategy

August 6, 2019

The number of public sector organizations that are ready to implement a cloud-first strategy or move their entire infrastructures to the cloud has decreased by almost 20% since 2018, according to Netwrix. In fact, only 32% of government organizations would […]


Network security

Trump alleges Google manipulated voters against him

August 20, 2019

Via: The Hill

President Trump alleged Monday that Google manipulated millions of voters into supporting former Secretary of State Hillary Clinton in the 2016 election, saying the company “should be sued” in his latest attack on the tech giant. The president in a […]


Hacker, Mobile, Mobile security, Threats & Malware

Hacker publicly releases Jailbreak for iOS version 12.4

August 20, 2019

Via: Security Affairs

A public Jailbreak for iPhones in was released by a hacker, it is an exceptional event because it is the first in years. According to Motherboard, that first reported the news, Apple accidentally unpatched a flaw it had already fixed […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

Routers from well-known manufacturers vulnerable to cross-router data leaks

August 19, 2019

Via: Help Net Security

While many organizations and home networks use a host and guest network on the same router hardware to increase security, a new study by Ben-Gurion University indicates that routers from well-known manufacturers are vulnerable to cross-router data leaks through a […]