How Secure Communication Can Enhance Your Organization’s Cyber Defence
By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due…
By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due…
This post will show you the differences between CCPA and GDPR compliance. CCPA and GDPR both protect the rights of…
The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework called PhonyC2 that's been…
Thea Guanzon’s debut novel, The Hurricane Wars, takes inspiration from the myths and culture of her native Philippines—but it also…
After debuting in Japan, earlier this year, Sony is finally ready to bring Mocopi—the company’s smartphone-based wearable motion-tracking system—to the…
Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of…
Latest episode - listen now! (Full transcript inside.)
Misconfiguration exposed the physical addresses of 60,000 patent filers over three years.
CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2019-17621 D-Link…
1. EXECUTIVE SUMMARY CVSS v3 7.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Ovarro Equipment: TBox RTUs Vulnerabilities: Missing Authorization, Use…