CyberGhost VPN patches command injection vulnerability
Researcher who discovered the bug left fuming over the difficulties he had disclosing it. Article Link: <strong>CyberGhost VPN patches command...
Researcher who discovered the bug left fuming over the difficulties he had disclosing it. Article Link: <strong>CyberGhost VPN patches command...
A few weeks ago I ran into a conversation on Twitter about the weaknesses of applied cryptography textbooks, and how...
"When assets are overdone, they just feel a little dirty. It's not pretty to look at," shared Mirandus' Lead Developer...
Post Content
Recognition for extraordinary contributions to channel initiatives, leadership, and support for partners and customers. Article Link: CRN names 11 Sophos...
Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack...
Waratek introduced API security to its Java Security Platform, giving customers the ability to scale strategic risk mitigation in the...
The Principality of Liechtenstein may follow suit of several cantons in the neighboring Switzerland by accepting Bitcoin for state services.
Are you concerned about ransomware attacks? You're not alone. In recent years, these attacks have become increasingly common and can...
In 2016, the European Commission instituted the first European Union (EU) cybersecurity initiative, the Directive on Security of Network and...