Month: March 2019
-
Microsoft Security Intelligence Report reveals a rise in Phishing attacks
Microsoft has released a new Security Intelligence Report that reveals a bump in Phishing attack numbers. The report highlights the attacks …
-
How to Accelerate Your Cloud IAM Adoption
Cloud identity and access management (IAM) is quickly becoming a cost-effective and flexible model for modern IAM programs. According to …
-
Companies are flying blind on cybersecurity
IT managers are flying blind in the battle to protect their companies from cyberattacks, according to a survey released today. The result …
-
Organizations Taking Less Time to Detect Breaches
Internal security teams at enterprise organizations are generally getting better at detecting compromises, but it’s still taking them well …
-
Phishing alert: One in 61 emails in your inbox now contains a malicious link
The number of phishing attacks is on the rise, more than doubling in recent months, with one in 61 emails delivered to corporate inboxes …
-
Digital Transformation Needs Security Transformation, Too
Digital Transformation Needs Security Transformation, Too CISO Scott Howitt of MGM Resorts Describes Adoption of New DevOps Methods Scott …
-
Alcatel-Lucent (Nokia) GPON I-240W-Q – Buffer Overflow
Alcatel-Lucent (Nokia) GPON I-240W-Q – Buffer …
-
STOPzilla AntiMalware 6.5.2.59 – Privilege Escalation (2)
STOPzilla AntiMalware 6.5.2.59 – Privilege Escalation …
-
CMSsite 1.0 – Multiple Cross-Site Request Forgery
CMSsite 1.0 – Multiple Cross-Site Request …
-
elFinder 2.1.47 – ‘PHP connector’ Command Injection
elFinder 2.1.47 – ‘PHP connector’ Command …
-
OOP CMS BLOG 1.0 – Multiple SQL Injection
OOP CMS BLOG 1.0 – Multiple SQL …
●●●