SMBs are being bombarded by unsolicited bug bounty requests
Cyber-Attacker Tries to Remotely Poison Florida City
Unknown assailant hijacked system to increase sodium hydroxide levels
Command Injection on a D-Link Router
During the COVID-19 pandemic, I wanted to extend the local WiFi in my home to reach all the floors. The goal was to have full connectivity from every location in the house.
Krakow Internship
The beginning of a new year is a time to look back and reflect on the previous one. December 31st is also the end date of our annual Krakow Internship Program.
Holiday Season Phishing Attacks on the Rise
Phishing continues to be a major attack vector, and it’s surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted p…
Paralegal’s Pal Admits Outing Witnesses
Iowan pleads guilty to accessing sensitive, non-public information and releasing it on Facebook
Law Firm Data Breach Impacts UPMC Patients
PHI of more than 36k UPMC patients may have been exposed following attack on law firm
Emsisoft Suffers System Breach
Configuration error allows unauthorized third party to access anti-malware solution maker’s technical logs
Comprehensive Identity-as-a-Service (IDaaS): Protect all your apps with cloud access management
Comprehensive Identity-as-a-Service (IDaaS): Protect all your apps with cloud access management
Over a decade ago, the need for quicker SaaS onboarding led to Siloed IAM for early IDaaS adopters. For many, IDaaS evolved to a Hybrid IAM approach. To…
Remote Desktop Protocol Attacks Surge by 768%
RDP attacks continued to grow in Q4 of 2020, but at a slower rate