#thinkcybersec: Don’t Presume Legacy Tech is a Negative Thing
Legacy technology is not always as bad as it is commonly believed to be, according to a panel of CISO speakers. Speaking during the Think …
Legacy technology is not always as bad as it is commonly believed to be, according to a panel of CISO speakers. Speaking during the Think …
An increase in ransomware sophistication, commodity malware and abuse of legitimate tools are predicted to be the main threats for the next …
Trula, a sophisticated hacking group also known as Krypton, VenomousBear, Waterbug, Uroburos, or Snakegroup targets government entities, …
Campaigns CISA and NCSC have identified two campaigns of activity for QSnatch malware. The first campaign likely began in early 2014 and …
Zoom has fixed a zero-day vulnerability announced last week which affects legacy Windows customers. The popular video conferencing platform …
Zoom is scrambling to fix another zero-day vulnerability in its Windows client, this time potentially leading to arbitrary remote code …
As more organizations adopt modern authentication protocols, legacy authentication poses a growing risk to those who lag behind. The …
Sonos appears to have bowed to customer pressure and will now offer security updates for legacy kit and ensure it can co-exist with newer …
“Complex problems cannot be solved with simple solutions.” These were the words of Bobby Ford, VP & Global CISO at Unilever, speaking …
Malware can bypass protections in macOS Mojave, and potentially access user data as well as the webcam and mic – by exploiting a hole in …
The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy …
Machine learning (ML) and artificial intelligence (AI) are in the process of changing almost every aspect of our lives. My last post …