by Liquid Video Technologies | Sep 21, 2020 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach, Uncategorized, Websites
An unpatched security weakness in Google Drive could be exploited by malware attackers to distribute malicious files disguised as legitimate documents or images, enabling bad actors to perform spear-phishing attacks comparatively with a high success rate. The latest...
by Liquid Video Technologies | Sep 18, 2020 | Access Control, Cybersecurity, Data Breaches, Mobile Access Control, Network Security, Security, Security Breach
Jenkins, a popular open-source automation server software, published an advisory on Monday, August 17, 2020 concerning a critical vulnerability in the Jetty web server that could result in memory corruption and cause confidential information to be disclosed. Tracked...
by Liquid Video Technologies | Sep 11, 2020 | Access Control, Business, Computer Networking, Cybersecurity, Data Breaches, Network Security, Security, Security Breach, Technology News
COVID-19 Cybersecurity With the significant increase of cyberattacks following COVID-19, cybersecurity has been forced to change with the times. For much of this year, IT professionals all over the globe have had their hands full, finding ways to help...
by Liquid Video Technologies | Sep 9, 2020 | Access Control, Cybersecurity, Data Breaches, Https, Network Security, Security Breach, Technology News
A new research has identified four new variants of HTTP request smuggling attacks that work against various commercial off-the-shelf web servers and HTTP proxy servers. Amit Klein, VP of Security Research at SafeBreach who presented the findings today at the Black Hat...
by Liquid Video Technologies | Dec 30, 2019 | Access Control, Cybersecurity, Data Breaches, Network Security, News, Security, Security Breach, Technology News
Mobile computing, cloud applications and tele-work have all combined to erode the traditional corporate security perimeter — and, in doing so, have largely transferred the attack surface to end-user devices. Each endpoint is now its own perimeter in today’s Zero Trust...
by Liquid Video Technologies | Nov 27, 2019 | Access Control, Cybersecurity, Data Breaches, Network Security, News, Security, Technology News, Websites
With the holidays approaching, many of us are thinking about taking time off from work to be with friends and family, as well all the last minute shopping that needs to be done. The sad truth is that cyber criminals do not take vacations and may be looking at the...
Recent Comments