An Actively Exploited Microsoft Zero-Day Flaw Still Has No Patch

An Actively Exploited Microsoft Zero-Day Flaw Still Has No Patch

Researchers warned last weekend that a flaw in Microsoft’s Support Diagnostic Tool could be exploited using malicious Word documents to remotely take control of target devices. Microsoft released guidance on Monday, including temporary defense measures. By Tuesday, the United States Cybersecurity and Infrastructure Security Agency had warned that “a remote, unauthenticated attacker could exploit this vulnerability,” known as Follina, “to take control of an affected system.” But Microsoft would not say when or whether a…

Read More

Dan Dennis named SVP, Chief Information Security Officer at Hyland

Dan Dennis named SVP, Chief Information Security Officer at Hyland

Dan Dennis named SVP, Chief Information Security Officer at Hyland | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Warning: Hackers Are Targeting The Ukraine Refugee Crisis

Warning: Hackers Are Targeting The Ukraine Refugee Crisis

Ukrainian government agencies and cybersecurity companies warn about attempts to hack organizations helping hundreds of thousands leave the country as it is bombarded by Russian bombs. Michael Kappeler/dpa/picture alliance via Getty Images Cyberattacks have been launched on organizations and individuals helping refugees trying to get out of Ukraine. Some may have been carried out by a Belarus-linked hacking group and the attackers have access to an email account of at least one Ukrainian military officer,…

Read More

Listen to Michael Welch and how to address fourth-party risks and improve supply chain security in our latest The Security Podcast episode

Listen to Michael Welch and how to address fourth-party risks and improve supply chain security in our latest The Security Podcast episode

Page Not Found | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message…

Read More

The evolution of enterprise security since 9/11

The evolution of enterprise security since 9/11

The evolution of enterprise security since 9/11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Listen to Meredith Wilson, Founder of Emergent Risk International talk geopolitical risks

Listen to Meredith Wilson, Founder of Emergent Risk International talk geopolitical risks

Listen to Meredith Wilson, Founder of Emergent Risk International talk geopolitical risks This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Embrace a holistic approach to vulnerability management

Embrace a holistic approach to vulnerability management

Embrace a holistic approach to vulnerability management | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Mitigating risk through holistic scenario-based training

Mitigating risk through holistic scenario-based training

Mitigating risk through holistic scenario-based training | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Video management within healthcare: Adding value across the enterprise

Video management within healthcare: Adding value across the enterprise

Video management within healthcare: Adding value across the enterprise | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

The challenge of mask enforcement amid the pandemic

The challenge of mask enforcement amid the pandemic

The challenge of mask enforcement amid the pandemic | 2021-06-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 12 13 14 15