Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important, and four as critical bugs existing in Microsoft Windows, SharePoint Server, Edge browser, Azure Sphere,...
Anti-forensics techniques are designed to frustrate digital forensics investigators. They comprise tact and tools to hoodwink digital forensics investigation. Besides, cybercriminals use anti-forensics tools to hide their footprints from computer forensics experts after a data breach or malware campaigns.
This...
The future of cloud computing and the corresponding information security is and should be the prime concern for every business, provided a majority of them are migrating or aiming to shift to the cloud to further develop their business...
The rise of IoT devices in the health care sector led to various potential cyber risks. The usage of wearable devices like fitness bands and health trackers has become rampant lately. The security of fitness trackers becomes a perennial concern...
With the evolution of new threat actors and their latest attack vectors, the cyberthreat landscape is larger than expected. Security experts from AirEye recently uncovered a new hacking method, dubbed as SSID Stripping, which could be leveraged to trick...
Sharing sensitive data for processing among ecosystem partners is a challenge. We continue to see enterprises grapple with security concerns associated with moving workloads to the cloud. That’s why Confidential Computing has garnered much interest. As conversations move from...
Not only health care providers, organizations that provide health care technology also become vulnerable to cyberattacks. Medical technology provider Olympus admitted that it had sustained a malware attack lately that impacted some of its sales and manufacturing networks in...
The Citizen Lab informed about a new zero-click iMessage exploit, FORCEDENTRY, targeting Apple's image rendering library. Apple released a security update to address the zero-day vulnerability infecting its products.
See also: Why Zero Trust Model is a Top Priority for Security...
Man-in-the-middle (MITM) attacks are gaining importance in the cyberattack landscape as threat actor groups are leveraging it more often to harvest users’ sensitive data and break into targeted network systems. Personal information obtained via MITM attacks could be used...
Gartner estimates that around 30% of workers in India will be remote in 2022. While the penetration might be low compared to the U.S., where remote work will account for around 53% of the workforce, the sheer volume of...