20.8 C
Munich
Wednesday, May 29, 2024
- Advertisement -

ARCHIVE

Monthly Archives: October, 2022

Security Professionals, BEWARE of Fake PoCs

Proof-of-concept (PoC) of exploits for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and...

Why Is Database Encryption Important?

With data breaches continuing to occur at an alarming rate, protecting sensitive data is critical for all businesses. As organizations store more data than...

Cybercrime: Face the Facts

We need to face some hard facts, to move forward. Fact #1: cybercrime is here to stay It has been around for many decades, but in...

Apple patches its ninth vulnerability for this year

Since the start of 2022, Apple has addressed nine vulnerabilities with the latest one affecting iOS and iPadOS. This Monday, Apple rolled out updates to...

How to Detect and Fix the “Text4Shell” Vulnerability

What is Text4Shell Similar to the Spring4Shell and Log4Shell vulnerabilities, Text4Shell is a new vulnerability reporter by Alvaro Munoz, in the Apache Commons Text library....

Best Information Security Books

People refrain from reading either it is for pleasure or for professional and academic progression. If you are an information/cyber security professional who wants to...

Steps to a Secure Portfolio: Due Diligence During M&A & Beyond

Did you know that less than five percent (5%)1 of organizations engaging in mergers and acquisitions (M&A) will consider cybersecurity risk assessments during the...

How to get Cybersecurity experience as a beginner?

The demand for skilled workers is constantly growing and if you are a beginner in infosec/cybersecurity, you need to find ways to acquire relevant...

Latest news

- Advertisement -