According to a blog post from IT security company Palo Alto Networks, a new variant of the IoT/Linux botnet Tsunami, which it calls Amnesia,…
Browsing: Identity and access management (IAM)
Remember the board game Mouse Trap? The objective of the game was for the mouse to capture the board, while…
Following the news that hackers are targeting third-party sellers on Amazon.com, Andy Heather, Vice President and General Manager, EMEA at Centrify commented below. Andy…
Following the news that hackers activated emergency sirens in Dallas over the weekend, Chris Pogue, CISO at Nuix commented below. Chris…
This year alone, we have seen a hacker take control of a hotel’s key card system, locking guests in their…
The “Shadow Brokers” hacker group has released malware allegedly created by the US National Security Agency (NSA). The group, which…
Following the news that hackers are targeting Amazon third-party sellers, using stolen credentials to post fake deals and steal cash, Kevin…
San Antonio, TX. Digital Defense, Inc., a leading provider of Vulnerability Management as a Service (VMaaS™), disclosed the discovery of four…
The FDA is concerned about medical device vulnerability as per this article, Ilia Kolochenko, CEO of web security company about…
Last week, Radware highlighted a new form of malware called BrickerBot that corrupts a device’s storage capability and reconfiguring kernel parameters. Cesare…