GFI Software Announces Revolutionary AppManager™ Product to Unify Management of IT Solutions
Cloud-based platform consolidates software interfaces and customer accounts for managed service providers Ft. Lauderdale, FL (February 15, 2023) — GFI …
Latest News
Subscribe to Our Newsletters
Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.
More in Tech
Researchers Take Down VASTFLUX — a Massive Ad Fraud; 11 Million Devices and 1,700 Apps Affected
Security researchers at HUMAN have taken down a gigantic ad fraud operation, dubbed VASTFLUX, that affected 11 million devices, 1,700 applications, and 120 publishers. “VASTFLUX” is a derivation of “fast flux” (a cybercrime evasion technique) and “VAST” (a digital ad template abused in the operation). HUMAN is a private organization that aims to prevent cybercrime, focusing on bot detection.
35,000 PayPal Accounts Hit with Credential Stuffing Attack
PayPal sends security incident notifications about a credential stuffing attack that affected nearly 35,000 users. The attack occurred between Dec. 6. to Dec. 8. 2022. During the two-day window, the attackers gained access to highly sensitive information, including account holders’ full names, dates of birth, postal addresses, social security numbers, and tax identification numbers.
Top 9 NGFW Solutions for 2023
Next-generation firewalls (NGFWs) are the wave of the future for small businesses to large enterprises. So far, for 2023, they represent a 20% market share! But as the security challenges advance, security teams must rise to meet them with better protective technology.
Trend Micro’s Investigation into GitHub Codespaces Reveals Malware Vulnerability
Trend Micro researchers have revealed how the port-forwarding feature within GitHub Codespaces is a vulnerability which cybercriminals could abuse to deliver and host malware. The researchers found that threat actors could abuse the public sharing of forward ports to create a malware server. All cybercriminals need to do to avoid detection and suspicion is use a legitimate GitHub account. As of yet, the security vulnerability hasn’t been exploited in the wild.