Cybersecurity News
7 Cybersecurity Priorities for Government Agencies & Political Campaigns

09 September 2020
Cybersecurity 101: Protect your privacy from hackers, spies, and the government
Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.09 September 2020
TeamTNT Gains Full Remote Takeover of Cloud Instances

09 September 2020
Critical Flaws in 3rd-Party Code Allow Takeover of Industrial Control Systems

09 September 2020
Multiparty Encryption Allows Companies to Solve Security-Data Conundrum
An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.09 September 2020
Top 5 Identity-Centric Security Imperatives for Newly Minted Remote Workers
In the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.09 September 2020
Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban

09 September 2020
Weave Scope is now being exploited in attacks against cloud environments
The legitimate cloud infrastructure monitoring tool has been added to attacker arsenals.09 September 2020
Adobe Experience Manager, InDesign, Framemaker receive fixes for critical bugs in new update
The worst issues can lead to code and browser-based JavaScript execution.09 September 2020
Next-Gen Firewalls 101: Not Just a Buzzword

08 September 2020
Microsoft Patch Tuesday, Sept. 2020 Edition
Microsoft today released updates to remedy nearly 130 security vulnerabilities in its Windows operating system and supported software. None of the flaws are known to be currently under active exploitation, but 23 of them could be exploited by malware or malcontents to seize complete control of Windows computers with little or no help from users.08 September 2020
Microsoft Fixes 129 Vulnerabilities for September's Patch Tuesday
This month's Patch Tuesday brought fixes for 23 critical vulnerabilities, including a notable flaw in Microsoft Exchange.08 September 2020
Microsoft’s Patch Tuesday Packed with Critical RCE Bugs

08 September 2020
Critical Intel Active Management Technology Flaw Allows Privilege Escalation

08 September 2020
WordPress Plug-in Has Critical Zero-Day
The vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.08 September 2020
Google Cloud Expands Confidential Computing Lineup
Google plans to build out its Confidential Computing portfolio with the launch of Confidential GKE Nodes for Kubernetes workloads.08 September 2020
VPNs: The Cyber Elephant in the Room
While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.08 September 2020
Microsoft September 2020 Patch Tuesday fixes 129 vulnerabilities
Twenty critical remote code execution bugs have been patched this month, including in Windows and SharePoint enterprise servers.08 September 2020
Women in Payments: Q&A with Julie Krueger
When Julie Krueger graduated from college 35 years ago, only five percent of her electrical engineering class were women. Today, that number has improved, but not nearly enough. In this month’s blog series, Krueger encourages women to persist no matter what.
08 September 2020