Organizations in the Middle East will be able to better protect themselves against...
Understanding API Security Let’s start at the beginning. What are APIs? In modern mobile,...
MOVEit Transfer is a popular file transfer program developed by Ipswitch, a subsidiary of...
Security Flaw in Email Security Gateway The California-based company investigation has revealed that the flaw is rooted in a component that screens the...
Do I Need to Care About Compliancy with Industry Standards? Compliance provides a framework for businesses to identify potential cyber security risks,...
Outlook Vulnerability Allows Zero-Click Attackers to Compromise User Authentication An attacker who successfully exploited this vulnerability could access a...
The Drawbacks of Traditional Vulnerability Management Traditional vulnerability management is the process of identifying, assessing, and addressing...
Overview FortiOS SSL-VPN doesn't validate HTTP requests properly, leading to an overflow of heap buffer using specially crafted requests.
What Is Phishing? Firstly, let's have a quick recap on phishing. Phishing aims to lure individuals into providing sensitive information, including credit card...