Jan 25, 2024NewsroomVulnerability / Software Security
The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security...
COMMENTARYOrganizations are facing a challenging cybersecurity environment and a chaotic threat landscape. With an increasingly broad range of sophisticated, easy-to-use tools in the...
Security researchers hacked the Tesla infotainment system and demoed 24 more zero-days on the second day of the Pwn2Own Automotive 2024 hacking competition.
Synacktiv...
Jan 25, 2024NewsroomRemote Access Trojan
Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC.
"SystemBC can be...
The most recent ISC2 Cybersecurity Workforce Study found a shortfall of 111,000 professionals in the Middle East and Africa region. While that number...
How important is privacy in building and maintaining trust with customers? While more than 160 countries have omnibus privacy laws today, business leaders...
In the ever-evolving cybersecurity landscape, 2023 witnessed a dramatic surge in the sophistication of cyber threats and malware. AT&T Cybersecurity Alien Labs reviewed...