By Paolo Passeri According to Netskope’s latest “Year in Review” Cloud and Threat Report, social engineering was the primary method cyber attackers utilized to infiltrate organizations in 2023. Contrary perhaps to the
December 22, 2024
December 22, 2024
Copyright 2023, IT Voice Media Pvt. Ltd.
All Rights Reserved
By Paolo Passeri According to Netskope’s latest “Year in Review” Cloud and Threat Report, social engineering was the primary method cyber attackers utilized to infiltrate organizations in 2023. Contrary perhaps to the
Overview During the March “Patch Tuesday” security update, a new Outlook security vulnerability was revealed as being exploited in the wild. This is a serious vulnerability that has the potential to compromise
Tenable®, the Exposure Management company, today announced the release of Tenable One, a revolutionary Exposure Management platform that unifies discovery and visibility into all assets and assesses their exposures and vulnerabilities across
In Q2 2022, the number of exploits for vulnerabilities in the Microsoft Office suite increased – accounting for 82% of the total number of exploits across different platforms, according to the latest
Appknox, a leading mobile security testing platform, has announced two new features today – Root Detection Bypass and Jailbreak Detection Bypass. Through these features, Appknox users can identify if Root Detection has
Tenable Research released a publication which has a detailed information of the vulnerability found in MX Player. MX Player is an Indian video streaming and video-on-demand platform. The vulnerability found can leave
The current pandemic situation has forced the organizations to completely rethink their business models, working procedures and policies maintaining the norms of social distancing to ensure a secure and sound environment for
Filip Cotfas, Channel Manager, CoSoSys in one of his article writes about the changing times and changing trends due to this pandemic situation. He stated that the current pandemic situation has forced
A day after Wikileaks second archive of the Central Intelligence Agency (CIA) files claiming the agency developed hacking devices for Apple products, the Cupertino-based tech company has refuted security vulnerabilities in its
Expanding its global security presence, Accenture has opened its largest cyber security facility in Bengaluru. The new state-of-the-art facility uniquely brings together interdisciplinary capabilities, ranging from the innovation, incubation and development of
Palo Alto Networks has discovered a widespread vulnerability in Google’s Android mobile operating system that allows attackers to hijack the installation of the Android Package File (APK) app on user devices and
Security concerns among technical professionals are growing as their access to information makes them of increased interest to adversaries in the physical, or analog world. To help the technical community better protect