Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control.
The Voice of Cyber®
Reports & Predictions
Updates on new primary reports from researchers and analysts inside the cybersecurity industry.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy ...
Annual Phishing Report Highlights New and Evolving Phishing Campaigns Resulting from the Rise of AI Platforms, like ChatGPT, Urges Organisations to Adopt a Zero Trust Architecture
As cloud adoption continues to surge, with a projected market size of $830 billion in 2025, threat actors are increasingly targeting common vulnerabilities in the cloud.
F5’s latest Curve of Convenience report shows, in the event of a data leak, majority of A/NZ consumers are unwilling to continue buying from the company involved (71%). Most ...
Updated CMMI version addresses data management, people management, and remote/virtual workforce effectiveness.
Data uncovers correlation between cybersecurity debt and ransomware incidents
In The News
Sort By
- Date
- Title
GoTo announces IT Asset Management, Logitech integration, AI advancements and more, driving continued innovation for remote IT support.
Nearly a third of end-user respondents said their organisations were targeted by cyber threats.
Trustwave, a leading cybersecurity and managed security services provider, has released comprehensive research shedding light on the distinctive cybersecurity risks facing ...
Trustwave, a leading cybersecurity and managed security services provider, has released comprehensive research shedding light on the distinctive cybersecurity risks ...
Criminal Community-Sponsored Contests Mirror Cybercrime Trends, Such as Disabling AV/EDR, Cryptocurrency Fraud, and C2 Frameworks
It Takes Less Than a Day for Attackers to Reach Active Directory—Companies' Most Critical Asset. The Vast Majority of Ransomware Attacks Occur Outside of Business Hours.
Podcasts On Reports & Predictions
No results found.