Synology releases patch for critical RCE vulnerability affecting VPN Plus servers

Synology has released a security update to address a critical vulnerability in VPN Plus Server that could be used to take over an affected system. The vulnerability registered as CVE-2022-43931 has a maximum severity of 10 in the CVSS rating and was described as a write out of bounds error in the Remote Desktop feature […]

WhatsApp introduces proxy support to help users bypass internet censorship

Popular instant messaging service WhatsApp has introduced support for proxy servers in the latest versions of its Android and iOS apps. This allows users to avoid government-imposed censorship and internet shutdowns. “By choosing a proxy, he can connect to his WhatsApp through servers set up by volunteers and organizations around the world, allowing people to […]

The Era of Cyber ​​Threat Information Sharing

We have spent 40 years protecting ourselves as individuals. We tried to trick and outsmart the cybercriminals, but when all our efforts failed, we thought of working with our peers to outnumber them. Cybercriminals don’t remake themselves every time. They have limited resources and limited budgets. So they use playbooks to attack a lot of […]

85% of attacks now use encrypted channels

According to Zscaler, malware continues to be the biggest threat to individuals and businesses across nine key industries, with manufacturing, education, and healthcare being the most common targets. Encryption attacks remain a serious problem for countries around the world, with the United States, India and Japan seeing the largest increases in attacks in 12 years. […]

What Cybercrime & Security Will Look Like in 2023

Threat actors continue to adapt to the latest technologies, practices, and even privacy laws. It’s up to your organization to stay ahead by implementing strong cybersecurity measures and programs. Here’s how cybercrime will evolve in 2023, and what you can do to keep your business safe and secure in the year ahead. Surge in Attacks […]

Cybersecurity is not a losing game – start now

Reality has a way of asserting itself, no matter what personal or business choices we make, good or bad. For example, very recently, the services of the city of Antwerp in Belgium were the victim of a very disruptive cyber attack. As usual, people cried out ‘bad play’ and suggested that appropriate cybersecurity measures should […]

24% of Technology applications contain high-risk security vulnerabilities

With a higher percentage of applications arguably processed than other industries, technology companies can benefit from implementing improved secure coding training and practices for their development teams. In fact, Veracode revealed that 24% of applications in the technology sector contain vulnerabilities considered high-risk. “Expanding software security intuition by providing developers with hands-on experience of what […]

5 Strategies To Defend Against Automated Cyber Attacks

[et_pb_section transparent_background=”off” allow_player_pause=”off” inner_shadow=”off” parallax=”off” parallax_method=”on” make_fullwidth=”off” use_custom_width=”off” width_unit=”off” custom_width_px=”1080px” custom_width_percent=”80%” make_equal=”off” use_custom_gutter=”off” fullwidth=”off” specialty=”off” admin_label=”section” disabled=”off”][et_pb_row make_fullwidth=”off” use_custom_width=”off” width_unit=”off” custom_width_px=”1080px” custom_width_percent=”80%” use_custom_gutter=”off” gutter_width=”3″ allow_player_pause=”off” parallax=”off” parallax_method=”on” make_equal=”off” parallax_1=”off” parallax_method_1=”on” parallax_2=”off” parallax_method_2=”on” parallax_3=”off” parallax_method_3=”on” parallax_4=”off” parallax_method_4=”on” admin_label=”row” disabled=”off”][et_pb_column type=”4_4″ disabled=”off” parallax=”off” parallax_method=”on”][et_pb_text background_layout=”light” text_orientation=”left” admin_label=”Text” use_border_color=”off” border_style=”solid” disabled=”off”] As automated cyber-attacks becoming more pervasive, Fortinet […]