Data Security Fabric: A New Approach in Securing Enterprise Data
The statement that data is the currency of the digital age could not be truer these days. Data is now so valuable that threat actors are always trying to steal,Read More →
The statement that data is the currency of the digital age could not be truer these days. Data is now so valuable that threat actors are always trying to steal,Read More →
Last week two zero-day flaws, CVE-2022-41040 and CVE-2022-41082, impacting Microsoft Exchange Server were revealed by the Vietnamese security firm GTSC. Microsoft later added the confirmation that the zero-day flaws affectingRead More →
RecordTV a news channel in Brazil suffered a cyber attack this Saturday morning that left the company’s network down. The attackers, who used the ransomware attack and stole personal dataRead More →
LibreOffice is a free and open-source office productivity software suite, a project of The Document Foundation. It was forked in 2010 from OpenOffice.org, an open-sourced version of the earlier StarOffice. Read More →
The leader in virtualization and cloud computing technologies, VMware, has released a security fix for two vulnerabilities in its vCenter Server software that might help attackers target numerous enterprises likeRead More →
Twelve new security flaws impacting various chipsets were disclosed in this month’s security advisory for Qualcomm’s devices, two of which have been given a critical severity rating.Two significant flaws inRead More →
Ferrari has suffered an attack that has resulted in 7 GB of stolen company information. The cyberattack has been produced and claimed by the ‘RansomEXX’ cybercriminal group, known for itsRead More →
Researchers have at last cracked the PlayStation’s security after nearly two years of work. The PS5 has been jailbroken and completely unlocked, making this the device’s first serious hack sinceRead More →
A security investigator has discovered three new code execution flaws in the Linux kernel that might be exploited by a local or external adversary to take control of the vulnerableRead More →
A software development life cycle is also called an application development life cycle. It describes the processes of software development from planning to maintenance. The processes are in six stages;Read More →