DHS Launches Bug Bounty Program

DHS Launches Bug Bounty Program The United States Department of Homeland Security has launched a new bug bounty program to identify potential cybersecurity vulnerabilities and increase the department’s cybersecurity resilience. …

Patch Tuesday December 2021 – Microsoft Fixes 67 Flaws, Including 6 Zero-Day Vulnerabilities

December’s Patch Tuesday comes with numerous security fixes and improvements, including two actively exploited zero-day vulnerabilities. The list features spoofing, denial of service, remote code execution, elevation of privilege, and…

Why Payroll Is The Next Company Security Battleground?

Payroll is one of the most appealing targets for cybercriminals, involving as it does the large transfer of money between institutions whilst being susceptible to hacking due to outdated technology…

Samsung S21 Series- Price, Features and More

The Samsung Galaxy 20 phones were no doubt incredible phones. But for many users, it felt like the company had pushed the price of this flagship phone a bit too…

What the Log4Shell Bug Means for SMBs: Experts Weigh In

An exclusive roundtable of security researchers discuss the specific implications of CVE-2021-44228 for smaller businesses, including what’s vulnerable, what an attack looks like and to how to remediate. News of…

Make Microsoft Defender AV Enterprise Class FREE – Morphisec Guard Lite

According to research, there are over 500 Million endpoints protected by the Microsoft Windows Defender Antivirus product. The sheer volume of endpoints makes Microsoft Defender a prime target for hackers…

Squid Game Used as Lure for Malware Campaigns, Phishing Attacks

Security Intelligence – Security Intelligence – Squid Game Used as Lure for Malware Campaigns, Phishing Attacks Digital attackers are using Netflix’s popular series “Squid Game” as a lure for their…

Fields of application of artificial intelligence

At present, it is difficult to find a field of work for people in which different mechanisms and machines are not used that facilitate human labor. Probably, soon the number…

Next-Gen Maldocs & How to Solve the Human Vulnerability

Malicious email attachments with macros are one of the most common ways hackers get in through the door. Huntress security researcher John Hammond discusses how threat hunters can fight back.…

HSE Missed Cyber-attack’s Warning Signs

HSE Missed Cyber-attack’s Warning Signs An investigation into the springtime cyber-attack on HSE Ireland has found that criminals spent two months inside the healthcare system's computer network before deploying ransomware.…