Google to Remove App that Made Google Pixel Devices Vulnerable to Attacks
Aug 16, 2024Ravie LakshmananMobile Security / Software Security A large percentage of…
Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service
Aug 13, 2024Ravie LakshmananHealthcare / Vulnerability Cybersecurity researchers have discovered two security…
Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers
Aug 09, 2024Ravie LakshmananCloud Security / Data Protection Cybersecurity researchers have discovered…
Insider Threats in The SaaS World
Aug 06, 2024The Hacker NewsSaaS Security / Threat Detection Everyone loves the…
DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws
Aug 03, 2024Ravie LakshmananPrivacy / Data Protection The U.S. Department of Justice…
DigiCert to Revoke 83,000+ SSL Certificates Due to Domain Validation Oversight
Jul 31, 2024Ravie LakshmananWeb Security / Compliance Certificate authority (CA) DigiCert has…
The Power and Peril of RMM Tools
As more people work remotely, IT departments must manage devices distributed over…
VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access
A recently patched security flaw impacting VMware ESXi hypervisors has been actively…
Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
Jul 29, 2024Ravie LakshmananEnterprise Security / Data Protection Cybersecurity company Acronis is…