

MOVEit Transfer is a popular file transfer program developed by Ipswitch, a subsidiary of...
Security flaw in email security gateway The California-based company investigation has...
Do I need to care about compliance with industry standards? Compliance provides a...
Outlook vulnerability allows zero-click attackers to compromise user authentication An attacker who successfully exploited this vulnerability could access a...
The drawbacks of traditional vulnerability management Traditional vulnerability management is the process of identifying, assessing, and addressing...
Overview FortiOS SSL-VPN doesn't validate HTTP requests properly, leading to an overflow of heap buffer using specially crafted requests.
What is phishing? Firstly, let's have a quick recap on phishing. Phishing aims to lure individuals into providing sensitive information, including credit card...
NIS: The EU-wide cyber security initiative In July 2016, The current Network and Information Security Directive (NIS Directive) became the first piece of...
Despite the difficult current conditions in the investment market, specialist B2B software venture capital firm Subvenio Invest has led the funding round,...