Microsoft thinking about open sourcing Windows 7 OS
A few days ago Microsoft announced the end of support for Windows 7, so the operating system would no longer receive free security updates, although apparently there are many interestedRead More →
A few days ago Microsoft announced the end of support for Windows 7, so the operating system would no longer receive free security updates, although apparently there are many interestedRead More →
The Cisco technology company has released a new cybersecurity report to disclose the remediation of a critical vulnerability the Cisco AsyncOS product zip decompression engine, for Cisco Email Security ApplianceRead More →
Just like every single week, a new security flaw report has appeared on Webex, Cisco’s video conferencing platform. The technology company has released a report, crafted by its vulnerability testingRead More →
Vulnerability testing specialists have revealed the discovery of a new vulnerability in Apache Tomcat. When using Authentication with Apache Tomcat, between versions 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0Read More →
The era of online shopping is in full swing. Now, more than ever, people are altering their shopping habits to be conducted almost completely online. Anything you need can beRead More →
Another day, another incident related to data protection. The Detroit city government offered more than 15,000 public employees a free credit monitoring service after a data breach was revealed, whichRead More →
This has been a complex and busy start of 2020 year for vulnerability testing specialists. This time, Samba, Microsoft’s shared file protocol just announced the release of some updates forRead More →
A new ransomware incident has harshly affected a major automotive company. Gedia Automotive Group, a German car parts manufacturer with nearly 5,000 employees in seven different countries, has confirmed aRead More →
For the development of its day-to-day operations, the United Nations (UN) employs multiple technological developments with the highest information security standards, including a vulnerability bounty program to solve security flawsRead More →
During 2019, network security specialists from Kaspersky issued reports on thousands of infections of Shlayer, a new Trojan family, managing to prevent attacks on one in ten Mac devices. AlthoughRead More →