"Featured" Related Articles

Microsoft OneNote will block 120 dangerous file extensions
Security Tools

Microsoft OneNote will block 120 dangerous file extensions

Microsoft has shared more information on what malicious embedded files OneNote will soon block to defend users against ongoing phishing...
Read The Article →
Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders
Security Tools

Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders

Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an attempt to...
Read The Article →
OpenAI: ChatGPT payment data leak caused by open-source bug
Security Incidents

OpenAI: ChatGPT payment data leak caused by open-source bug

OpenAI says a Redis client open-source library bug was behind Monday's ChatGPT outage and data leak, where users saw other...
Read The Article →
Fortinet plugs critical RCE hole in FortiOS, FortiProxy (CVE-2023-25610)
Vulnerabilities

Fortinet plugs critical RCE hole in FortiOS, FortiProxy (CVE-2023-25610)

Fortinet has patched 15 vulnerabilities in a variety of its products, including CVE-2023-25610, a critical flaw affecting devices running FortiOS...
Read The Article →
Veeam fixes bug that lets hackers breach backup infrastructure
Vulnerabilities

Veeam fixes bug that lets hackers breach backup infrastructure

Veeam urged customers to patch a high-severity Backup Service security vulnerability impacting its Backup & Replication software.The flaw was reported...
Read The Article →
WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation
Vulnerabilities

WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation

Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in...
Read The Article →
Microsoft Defender for Endpoint will turn on tamper protection by default
Ransomware

Microsoft Defender for Endpoint will turn on tamper protection by default

Microsoft says tamper protection will soon be turned on by default for all enterprise customers in Microsoft Defender for Endpoint...
Read The Article →
GTA 6 source code and videos leaked after Rockstar Games hack
Security Incidents

GTA 6 source code and videos leaked after Rockstar Games hack

Grand Theft Auto 6 gameplay videos and source code have been leaked after a hacker allegedly breached Rockstar Game's Slack...
Read The Article →
Hive ransomware claims cyberattack on Bell Canada subsidiary
Ransomware

Hive ransomware claims cyberattack on Bell Canada subsidiary

The Hive ransomware gang claimed responsibility for an attack that hit the systems of Bell Canada subsidiary Bell Technical Solutions.BTS...
Read The Article →
GIFShell attack creates reverse shell using Microsoft Teams GIFs
Vulnerabilities

GIFShell attack creates reverse shell using Microsoft Teams GIFs

A new attack technique called 'GIFShell' allows threat actors to abuse Microsoft Teams for novel phishing attacks and covertly executing...
Read The Article →
Soc Cybersecurity Specialist
Penetration Testing

When to Perform Penetration Testing on Your Organization

When should your organization perform a penetration test? A pentest, or penetration test, is an important security assessment that should...
Read The Article →
Critical vulnerabilities open Synology, QNAP NAS devices to attack
Vulnerabilities

Critical vulnerabilities open Synology, QNAP NAS devices to attack

Users of Synology and QNAP network-attached storage devices are advised to be on the lookout for patches for several critical...
Read The Article →

BOOK A MEETING

Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g: gmail.com, hotmail.com, etc.)

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.