Cyber Security

Unmasking the Dark Side of Low-Code/No-Code Applications

Dec 18, 2023The Hacker NewsTechnology / Application Security Low-code/no-code (LCNC) and robotic process automation (RPA) have gained immense popularity, but how secure are they?...

Tips for Discussing Cybersecurity Metrics with Boards

How should Chief Information Security Officers (CISOs) evaluate and report on the state of their organization’s cybersecurity and its impact on the business?...

What to do when receiving unprompted MFA OTP codes

Receiving an unprompted one-time passcode (OTP) sent as an email or text should be a cause for concern as it likely means your...

CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats

Dec 18, 2023NewsroomSoftware Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging manufacturers to get rid of default passwords...

Tips for Modernizing SecOps Teams

The security operations center is the enterprise's first line of defense against an active attack. It is also the base of all security...

WordPress hosting service Kinsta targeted by Google phishing ads

WordPress hosting provider Kinsta is warning customers that Google ads have been observed promoting phishing sites to steal hosting credentials. Kinsta says the phishing...

New Critical RCE Vulnerability Discovered in Apache Struts 2

Dec 12, 2023NewsroomVulnerability / Software Security Apache has released a security advisory warning of a critical security flaw in the Struts 2 open-source web...

Latest articles