Content Paint

Security

Log4J at 1: A third of downloads still vulnerable to RCE

A year after a critical vulnerability in a ubiquitous piece of open source software, Log4J, set off what The Stack described at the time as an “internet cluster bomb”, nearly 40% of downloads of the popular open source java logging library are still of the vulnerable version – despite the high

Rackspace confirms ransomware attack on $30m biz; 200k affected

Rackspace has confirmed that it was hit by ransomware. The incident on December 2 affected its hosted Microsoft Exchange offering, leaving hundreds of thousands of customer email inboxes inaccessible. The scale of the attack is significant. Rackspace said its Hosted Exchange business generates $30 million in annual revenue – but has

The slow demise of the VPN: 5 lessons from DoD's Zero Trust framework

From culture to SASE, DevSecOps to network segmentation

Rackspace hacked: Hosted Exchange Servers down as it warns of “extended outage”

Here's a free migration to the cloud, nevermind your old emails...

Pentagon admits hackers “roam freely” in its IT systems, eyes Zero Trust

"Previous deployments of application and server stacks have had issues..."

UK to expand NIS Regulations, bring MSPs, data centres in scope

It's going to cost suppliers too under proposed new cost recovery rules...

There's a howling gap in offshore oil and gas cybersecurity oversight

A federal watchdog is not pulling punches

Defending against Hive ransomware: It's time to use the attackers' tools

And, um, do you know how to restore from backup without Active Directory?

Infosys leak: IT firm left “god mode” AWS S3 key exposed on PyPi

"Our infrastructure has not been impacted by this incident and there is no loss of data."

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.