© 2021 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

Millions of Microsoft web servers powered by vulnerable legacy software

1
Millions of Microsoft web servers are running on unsupported and vulnerable versions of IIS More than a million still use...
Read more about Millions of Microsoft web servers powered by vulnerable legacy software

James Christiansen, Netskope: before you can control the data, you need to have visibility

As the cloud accelerated the way data is spread and delivered, it also created new opportunities for threat actors to...
Read more about James Christiansen, Netskope: before you can control the data, you need to have visibility

Infamous ransomware gangs are rebranding and preparing to strike

The most dangerous ransomware groups might have gone dark. But it only means they are rebranding, evolving their tactics, and...
Read more about Infamous ransomware gangs are rebranding and preparing to strike

Bill of materials: devil's in the software details

Supply chain attacks are notoriously difficult to prevent. Can transparency on what the software is made of help to prevent...
Read more about Bill of materials: devil's in the software details

‘Amazon’s Choice’ best-selling TP-Link router ships with vulnerable firmware

CyberNews researchers found numerous security flaws within the default firmware and the web interface app of the TP-Link AC1200 Archer...
Read more about ‘Amazon’s Choice’ best-selling TP-Link router ships with vulnerable firmware

Why does the U.S. want 'white hats' hacking satellites

Space is the final frontier for cybersecurity. With the number of satellites increasing every day, threat actors will soon note...
Read more about Why does the U.S. want 'white hats' hacking satellites

Here’s how to secure your company against ransomware attacks, according to CISA

Ransomware attacks continue to create serious damages and huge economic losses to private businesses, critical infrastructure, and government organizations. Over...
Read more about Here’s how to secure your company against ransomware attacks, according to CISA

Caught in a crossfire: how your data ends up on criminal forums

General news coverage might lull us into thinking that major hacks target businesses only. While there's some truth to that,...
Read more about Caught in a crossfire: how your data ends up on criminal forums