top of page


Aug 14, 2022
Growing Risks to the Global Supply Chain: Black Hat 2022 Report
The report highlights concerns over attacks on cloud services, ransomware and growing risks to the global supply chain.


Aug 12, 2022
Publicly exposed protocols - open doors for attacks
Organizations expose insecure protocols, including FTP, to the public internet, providing attackers an easy entry point to their network.


Aug 11, 2022
Phishing attacks against Cisco and Twilio
Recent unrelated attacks against Cisco and Twilio underscore the common technique used by attackers: phishing bypassing MFA.


Aug 10, 2022
Compromised code repositories highlight supply chain risk
Besides ransomware and phishing, application supplier risk is a growing concern, as attacks against code repos are getting more frequent.


Aug 9, 2022
Universities are highly attractive targets for email fraud
Universities are valuable "brands" for attackers to use in email impersonation attacks. Too few use DMARC to counter the attacks.


Aug 8, 2022
Kubernetes is growing, creating new challenges
Kubernetes adoption is growing fast, creating a gap in skills and management tools.


Aug 4, 2022
Ransomware – the current impact on organizations
A survey of more than 500 IT security decision makers in US and UK organizations details the impact of ransomware.

Aug 4, 2022
VMware urges to patch critical vulnerability CVE-2022-31656
VMware is urging administrators to patch several critical vulnerabilities. Fortunately, not so critical as last year's Vsphere bugs.


Aug 3, 2022
The risks of real customer data in testing environments
Test environments and datasets containing real customer data are a source of data leak risk.
bottom of page