


Log4j Attack Surface Remains Massive
Four months ago, the remote code execution hole exposed in the Apache Log4j logging tool still had a wide range of potential victims. Using the Shodan search engine, Rezilion discovered more than 90,000 Internet-exposed servers with a vulnerable version of the...
Defending Your Business Against Russian Cyber Warfare
As the West tightens its sanctions and supplies further assistance to Ukraine, we may anticipate Russian state-sponsored assaults to increase. The conflict in Ukraine is drawing attention from around the world. Russia has launched cyberattacks against Ukraine first,...
Former Uber Chief Security Officer To Face Wire Fraud Charges because of Failed Cybersecurity
Over the past few years, the road has not been smooth for former Uber Chief Security Officer Joseph Sullivan. On December 21, 2021, three additional wire fraud charges were added to the felony obstruction and misprision counts he was already facing due to his alleged...
NVIDIA Data Breach: Information on Employee Data Theft
Blog NVIDIA Data Breach: Information on Employee Data Theft NVIDIA Data Breach: Information on Employee Data Theft NVIDIA, famous for designing graphics processing units and integrated circuits, recently became the latest victim of a serious cyberattack. Officials...
Nearly Two-Thirds of Ransomware Victims Paid Ransoms in 2021
Leading research and marketing firm CyberEdge Group, which serves companies in the cybersecurity industry, just published its ninth Cyberthreat Defense Report (CDR). This report acts as the standard for gauging organizations’ security postures, documenting the...
New US Law to Require Cyber Incident Report
Cybersecurity concerns have gained even greater significance in the recent Russia-backed SolarWinds sabotage and the Ukrainian war. In response, the US House and Senate will soon pass the Cyber Incident Reporting for Critical Infrastructure Act of 2022. Shortly after...
Multiple Security Flaws Discovered in Popular Software Package Managers
Recent security vulnerabilities in popular software package managers are raising concerns among digital safety experts. When these flaws compromise machines, it may be possible for hackers to get their hands on sensitive information, including source code and access...
Mobile Threats Skyrocket
Although mobile devices are portable, powerful, and convenient, their use in employees’ jobs is coming at a price. The very features that make them compelling also render them especially vulnerable to hacking. Data shows that nearly one-third of zero-day attacks...
Hacked US Companies to Face New Reporting Requirements
When cybercriminals target sensitive data or charge companies or agencies a ransom to retrieve their encrypted information, the consequences can be dire. In response, Congress has passed a bill that will require that entities who deal with critical US security-related...
High Severity WordPress Plugin Bug Hits Three Million
According to security experts, a popular WordPress plugin contains a bug that could compromise user data and even hijack vulnerable websites. The solution is to update as soon as possible. The plugin, UpDraftPlus, is commonly used to back up users’ data. As a...