Home Search
remote work - search results
If you're not happy with the results, please do another search
Threat Actors Targeting Crypto Wallets with ElectroRAT Malware Campaign
Security researchers from Intezer discovered a wide-ranging marketing campaign targeting cryptocurrency holders to pilfer their private keys and compromise their crypto wallets. Threat actors...
Google Rolls Out January 2021 Android Security Update
Google has started rolling out security fixes with its January 2021 security updates for Android devices. The latest security fixes will address 42 vulnerabilities...
How NTT Ltd. in India is Protecting WFH Employees from BEC Attacks During the...
NTT Ltd. Global Threat Intelligence Center (GTIC) publishes a Monthly Threat Report based on its observations and research. Its October 2020 report featured an...
Are You a Thought Leader CISO? [INFOGRAPHIC]
Information security is a growing concern for small and big businesses alike. While we do everything we can in our power to protect the...
CISA Alerts About Path Traversal Vulnerability in Fortinet VPNs
The Cybersecurity and Infrastructure Security Agency (CISA) is warning users about the potential password leaks on Fortinet devices. In an official notification, the agency...
Endpoint Security is a Lot More Than Just Technology: Gartner
Speaking to CISO MAG, Prateek Bhajanka, Senior Principal Analyst, Gartner explains why endpoints have suddenly become so important in the realm of enterprise network...
State Actors Using MobileIron’s Vulnerability to Target UK Organizations: NCSC
In June 2020, MobileIron reported a critical RCE vulnerability registered under CVE-2020-15505. The vulnerability was fixed in its security update released on June 15,...
Third-Party Risk: Reactive to Predictive
Third-party risk management: the process, technology, and people whose goal is to lower the risk created by third-parties (vendors). Surveys of a wide range...
Cisco Fixes Multiple Vulnerabilities in Cisco Security Manager
In response to the multiple Cisco Security Manager vulnerabilities reported by security researcher Florian Hauser, the networking device manufacturer has published three advisories. The...
Ransomware Attacks Continue to Impact Digital and Security Transformation
A recent survey from CrowdStrike highlighted the continued spread of ransomware and the need for acceleration of both digital and security transformation. In its...