Most of Exim email servers could be hacked by exploiting 21Nails flaws
The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers to fully compromise mail servers. The maintainers of the Exim…
Hundreds of millions Of Dell PCs affected by CVE-2021-21551 flaws
American multinational computer technology giant Dell addresses a 12-year-old driver flaw, tracked as CVE-2021-21551, impacting millions of computers. Hundreds of millions of Dell computers worldwide are affected by a 12-year-old…
Experian API exposed credit scores of tens of millions of Americans
Experian API Exposed Credit Scores of Most Americans could have been accessed due to a weakness with a partner website. Experian API exposed credit scores of tens of millions of…
China-linked APT uses a new backdoor in attacks at Russian defense contractor
China-linked APT group targets Russian nuclear sub designer with an undocumented backdoor A China-linked cyberespionage group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy….
The SecureDrive® Solution
Comprehensive Tools for Improving Data Security By Sergey Gulyayev, COO, SecureData, Inc. Since 2007, SecureData Inc. has operated on the premise that protecting the world’s most sensitive and vulnerable information…
A new Linux Botnet abuses IaC Tools to spread and other emerging techniques
A new Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques. Researchers from Trend Micro have spotted a new Linux botnet…
Why cybersecurity is a driver for commercial success in 2021
By Laurent Celerier, EVP Technology & Marketing There is no question that COVID-19 has had far reaching and long-lasting impacts on the way people do things, not least the way…
Patchstack Protects The Web With Community
By Oliver Sild, the co-founder and CEO of Patchstack Web applications today are built with heavy use of open source code – all of which is largely put together by…
How to Simplify Zero Trust Adoption
By Bhavya Pathak, Product Marketing Manager, ColorTokens Gone are the days when an organization could trust everything within the four walls of its perimeter. Cloud computing, and accelerating digital transformation…
Microsoft fixes 2 critical Exchange Server flaws reported by the NSA
Microsoft patch Tuesday security updates address four high and critical vulnerabilities in Microsoft Exchange Server that were reported by the NSA. Microsoft patch Tuesday security updates released today have addressed…
How to provide both a Secure & Seamless Remote Onboarding Experience on a Regula Basis?
By Arif Mamedov, Ph.D., President of Regula Forensics, Inc. Onboarding is like a gateway, where you as a guard can either let the right person in or assure that a…
Gigaset Android smartphones infected with malware after supply chain attack
A new supply chain attack made the headlines, threat actors compromised at least one update server of smartphone maker Gigaset to deliver malware. The German device maker Gigaset was the victim…