Home Search
remote work - search results
If you're not happy with the results, please do another search
How to Prevent Account Takeover Attacks
In tandem with improvements in digital financial services and e-commerce, threat actors have gotten more creative with account takeover attacks and scams. You could...
Ransomware Operators Exploit 2 CVEs in VMWare ESXi
Ransomware gangs are evolving every day. The latest trend suggests that they are after the backup servers or machines that contain backed up data....
Cisco Fixes Multiple Vulnerabilities in its SD-WAN Products
Networking and hardware company Cisco asked its users to update their networking software immediately, citing critical security vulnerabilities in its products, including software-defined networking...
SonicWall Hacked Through Zero-Day Vulnerabilities in its VPN Product
Cybersecurity firm SonicWall, popularly known to provide security products like firewall and VPN access tools, in the wee hours of Friday night disclosed that...
Market Trends Report on Endpoint Security – 2020
With organizations going remote in the year 2020 thousands of desktops, workstations, laptops, mobile phones, tablets, access points, printers, IP-cams, USB devices, cloud VMs,...
Microsoft to Launch Enforcement Mode to Address Critical “Zerologon” Flaw
Microsoft has alerted security admins that it is enabling Domain Controller enforcement mode by default to address a critical Remote Code Execution (RCE) vulnerability...
DNSMasq Critically Vulnerable to DNS Cache Poisoning Attacks
Cybersecurity experts from security firm JSOF uncovered seven critical vulnerabilities in popular open-source Domain Name System (DNS) forwarding software DNSMasq, which is deployed in...
AjnaLens – Making Augmented Reality a Reality
In the last three decades, we have seen how innovation in computer technology has transformed human life at a rate which no other invention...
Strengthen Your Cloud! CISA Warns Organizations Amid Rising Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has advised users and organizations to strengthen their cloud security configurations after detecting multiple attacks targeting cloud...
What is an RDP attack?
Remote Desktop Protocol (RDP) attacks are becoming a nightmare for CISOs, CIOs, CTOs, and network administrators. They are an attack vector to enterprise networks....