Filter and Sort Reset
CVE 2024 42327
CyberSecurity

CVE-2024-42327: Zabbix Server SQL Injection Vulnerability

Sangfor and HKT Sign Memorandum of Understanding to Meet Critical Infrastructure Requirements for Enterprises
News

Sangfor and HKT Sign Memorandum of Understanding to Meet Critical Infrastructure Requirements for Enterprises

CVE 2024 8114
CyberSecurity

CVE-2024-8114: GitLab Privilege Escalation Vulnerability

15 Best Managed Detection and Response (MDR) Solutions
CyberSecurity

15 Best Managed Detection and Response (MDR) Solutions

What is Shadow IT?
Cloud and Infrastructure

What is Shadow IT?

PIKOM Lead 2024
Cyber Security

PIKOM Lead 2024

Scattered Spider Threat Actors
CyberSecurity

Scattered Spider Threat Actors: All You Need to Know

What is Shadow Data?
Cloud and Infrastructure

What is Shadow Data?

Understanding Smurf Attacks: History, Impact, and Prevention Strategies
CyberSecurity

Understanding Smurf Attacks: History, Impact, and Prevention Strategies

The Best Kaspersky Alternatives
CyberSecurity

The Best Kaspersky Alternatives

Retail Cybersecurity–Risks and Data Breaches in E-commerce
CyberSecurity

Retail Cybersecurity–Risks and Data Breaches

session hijacking
CyberSecurity

What is Session Hijacking and How to Prevent It