Choose a Category
Earlier this month, a vulnerability in the Apache Log4j logging framework was disclosed. The zero-day vulnerability was published by Alibaba Cloud’s security team as was
Last week Kronos (now Ultimate Kronos Group (UKG)) announced that they were hit by a ransomware attack that is likely to keep their system offline
By 2025, it’s estimated that cybercrime will cost the world $10.5 trillion annually—a figure that includes damage and destruction of data; theft of intellectual property,
Network security is described as the implementation of technologies, processes, and protocols designed to safeguard an organization’s communications and information.
In a previous blog I introduced you to the malware detection capabilities of Plixer’s intelligence product. I would like to circle back to some information
As more and more devices are added to the internet, a larger swath of insecurity comes with them. Botnets and compromised devices are the main
When we hear about a cyberattack these days, there’s often a reference to when the network was originally compromised. In recent years, the need to