Cyber Security

Critical Bugs in Canon Printers Allow Code Execution, DDoS

Canon has patched seven critical buffer-overflow bugs affecting its small office multifunction printers and laser printers.Tracked as CVE-2023-6229 through CVE-2023-6234 (plus CVE-2024-0244), they...

Security tips for remote workers using their own IT equipment

Business Security As personal devices within corporate networks make for a potentially...

Verizon insider data breach hits over 63,000 employees

Verizon Communications is warning that an insider data breach impacts almost half its workforce, exposing sensitive employee information. Verizon is an American telecommunications and...

Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network

Feb 07, 2024NewsroomCyber Espionage / Network Security Chinese state-backed hackers broke into a computer network that's used by the Dutch armed forces by targeting...

Akamai Announces Content Protector to Stop Scraping Attacks

PRESS RELEASECAMBRIDGE, Mass., Feb. 6, 2024 /PRNewswire/ -- Akamai Technologies, Inc. (NASDAQ: AKAM), the cloud company that powers and protects life online, today announced the availability of Content Protector,...

Celebrating the 2024 CX Customer Hero Award Winners 

The time of year, when Cisco customers and partners converge for a week at Cisco Live, has come again! This is also a...

Google says spyware vendors behind most zero-days it discovers

Commercial spyware vendors (CSV) were behind 80% of the zero-day vulnerabilities Google's Threat Analysis Group (TAG) discovered in 2023 and used to spy...

Cisco Adds New Security and AI Capabilities in Next Step Toward Cisco Networking Cloud Vision

PRESS RELEASEAMSTERDAM, Feb. 6, 2024 /PRNewswire/ -- CISCO LIVE EMEA -- Cisco (NASDAQ: CSCO), the leader in networking and security, today introduced new capabilities and technologies across its...

JetBrains warns of new TeamCity auth bypass vulnerability

JetBrains urged customers today to patch their TeamCity On-Premises servers against a critical authentication bypass vulnerability that can let attackers take over vulnerable...

Latest articles