
“Continuity Issues” Private Repository Contents Leak by Travis Cl
The maintainers of Travis CI, a continuous integration provider located in Berlin, have patched a [...]
“Double-barrelled” Zloader Attacks Disable Windows Defender to Evade Detection
An ongoing Zloader campaign utilises a new methodology to disable Microsoft Defender Antivirus. Formerly known [...]
SaaS Security 101: Essential Strategies for Businesses
Software companies have naturally embraced the cloud. It provides countless benefits for their clients, ranging [...]
Why Are SOC 2 Assessments Gaining Popularity in the UK and EU?
This is a guest article written by Ty Brush. The author’s views are entirely his [...]
Netgear’s Smart Switches Affected by Multiple Vulnerabilities
Netgear has released patches for the firmware version of more than a dozen smart switches [...]
Critical Bug Hacking into IoT Devices
Security experts are sending out a high alert on a critical vulnerability that heavily affected [...]
Death by Trust – The Dangers of Whitelisting
Introduction Whitelisting is a cyber security strategy where a user granted administrative rights could take [...]
“Fly Trap” Cyber Attackers Target Home Routers
Three days after the revelation, cyber attackers are commandeering home routers from 20 vendors along [...]
Ransomware Threat Actors Turn to Target the Cloud
As expected, in Q2 this year, cyber criminals shifted their focus to cloud-based apps. A [...]
“Hate Mail” How a Single Email Can Compromise Zimbra Webmail Servers
The Zimbra webmail solution is affected by two serious vulnerabilities that could allow an attacker [...]