The Latest in IT Security

Posts Tagged ‘endpoint security’

Typically used to steal money, BEC involves threat actors compromising email accounts at target companies and then targeting employees in charge of making payments with fraudulent emails that instruct them to wire transfer large amounts of money to bank accounts controlled by the attackers. In the attacks targeting the food and agriculture sector, however, the […]

Read more ...

Intel Intel has published 24 new advisories covering more than 50 vulnerabilities affecting the chip giant’s products. Seven advisories describe high-severity privilege escalation flaws. This includes one in the BIOS firmware of some Intel processors, one in XMM 7560 Modem software, a dozen in NUC BIOS firmware, three in chipset firmware, one in Data Center […]

Read more ...

The tech giant has taken the opportunity to reveal that it has paid out a total of $20 million through its Apple Security Bounty (ASB) program. The average reward in the product category is $40,000, and more than 20 separate payouts for high-impact vulnerabilities exceeded $100,000. Apple announced a private bug bounty program for iOS […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments