- Welcome Guest
- Sign In
Stand-alone automation platforms and low-code software tools in recent years enable vendors to increase sales of products designed for specific roles and functions directly to business users. Often, this puts IT management at arm's length from enforcing governance and security standards.
Government agencies have discovered a deadlier new home and office network device killer malware that replaces weaker VPNFilter code. U.S. and U.K. governments published a joint report Wednesday detailing a new malware strain developed by Russia's military cyber unit deployed in the wild since 2019....
New developments this month include a key acquisition to bolster and expand cloud computing. Keeper Security takes a big step toward integrating better security and cloud encryption architecture. Also significant is StormForge's release this month of a new solution for cloud environments with machin...
Brace yourself, 2022 promises to bring expanded cyber confrontations as ransomware attacks gain the high ground. A dangerous increase in ransomware attacks last year caused devastating compromises to government organizations, critical infrastructure, and businesses. Much of the increase resulted fro...
Cybersecurity researchers uncovered a vicious new threat that hides as legitimate systems software. With Linux kernel 5.12 you can update firmware, no reboot required. The last refinement in LibreOffice 7 series paves the way for a new set of features when Series 8 arrives. If that is not enough to ...
This nasty software bug has much of the IT world in a panic as it follows us into the New Year. No doubt, many organizations and SMBs with no IT staff are clueless about its existence. But ignorance of Log4j only makes them more susceptible to an attack. They remain defenseless.
Four out of five cybersecurity pros are fretting over the potential for a sneak attack by an adversary with a quantum computer that will render the encryption on their data ineffective. Quantum computers can process data much faster than most computers today because they use qubits to crunch data, w...
The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's ...
'Tis the season to go phishing. Nothing brings out digital bandits like the holidays, and this year is no exception. Proofpoint, an enterprise digital security company, reports its researchers are seeing a massive global increase in holiday-themed mobile phishing attacks, a.k.a. smishing. It noted t...
Over the last year, ethical hackers have prevented more than US$27 billion in cybercrime, according to a report by a leading bug bounty platform. In its annual Inside the Mind of a Hacker report, Bugcrowd maintained that ethical hackers working on its platform were able to prevent those cybercrime l...
Today LinuxInsider introduces a bimonthly news column to summarize some of the Linux and open-source consumer and enterprise events scattered around the Linux Sphere. Look forward to an assortment of topics that will keep Linux users and open-source supporters up to speed with new developments.
While migration to the cloud is at an all-time high, so is the growth of ransomware peddlers. Veritas Technologies surveyed more than 2,000 global IT leaders whose organizations have undertaken pandemic-led digital transformation. The study found the majority are severely vulnerable to ransomware at...
Shadow code -- third-party scripts and libraries often added to web applications without security validation -- pose risks to websites and jeopardize compliance with privacy regulations, according to new research conducted by Osterman Research for PerimeterX. Third-party code leaves organizations vu...
Backed by many of the world's largest companies for more than a decade, the Software Package Data Exchange specification is now an internationally recognized ISO/IEC JTC 1 standard. This comes during a transformational time for software and supply chain security. The Linux Foundation announced Thur...