Application Control 101: Definition, Features, Benefits, and Best Practices

Application control is part and parcel of the larger cybersecurity landscape of access control, as outlined by the National Institute of Standards and Technology (NIST). But what does the term…

NoReboot attack fakes iOS phone shutdown to spy on you

A new technique that fakes iPhone shutdowns to perform surveillance has been published by researchers.  Dubbed “NoReboot,” ZecOps’ proof-of-concept (PoC) attack is described as a persistence method that can circumvent…

Election Fraud Firm to Shut Down After Claims Debunked

Election Fraud Firm to Shut Down After Claims Debunked A controversial ‘cybersecurity consultancy’ has said it’s closing after its report into alleged election fraud in Arizona was roundly rebuffed by officials.…

Thousands of Schools Impacted After IT Provider Hit by Ransomware

Thousands of Schools Impacted After IT Provider Hit by Ransomware A leading provider of school website infrastructure has been hit by a ransomware attack, potentially disrupting thousands of global customers.…

Chinese scientist pleads guilty to stealing US agricultural tech

A Chinese national has pleaded guilty to the theft of agricultural secrets from the US, intended to reach the hands of scientists across the pond.  Xiang Haitao, formerly living in…

Researchers Warn of New Log4Shell-Like Java Vulnerability

Researchers Warn of New Log4Shell-Like Java Vulnerability Security researchers are warning of a critical new Java bug with the same root cause as the notorious Log4Shell vulnerability currently being exploited around the…

Organized Cybercrime Cases: What CISOs Need to Know

Trend Micro – Trend Micro – Organized Cybercrime Cases: What CISOs Need to Know Risk Management Jon Clay, VP of Threat Intelligence at Trend Micro, explores the latest Trend Micro…

Illinois fertility clinic, online pharmacy giant Ravkoo report data breaches

Online pharmacy company Ravkoo and Fertility Centers of Illinois (FCI) have both informed thousands of current and former patients of data breaches involving troves of their sensitive information.  The HIPAA…

JFrog researchers find JNDI vulnerability in H2 database consoles similar to log4shell

Security researchers from JFrog said on Thursday that they discovered a critical JNDI-based vulnerability in the H2 database console exploiting a root cause similar to Log4Shell. The CVE hasn’t been…

Hackers are sending malicious links through Google Doc comment emails

Research from cybersecurity company Avanan has shown that hackers are increasingly using Google Docs’ productivity features to slip malicious content past spam filters and security tools.  Avanan’s Jeremy Fuchs said…