Shadow IT is taking on new dimensions as Software as a Service or cloud-based applications gain in popularity. But with the benefits of SaaS come increased risks for the enterprise. This Insight looks at the growth of Shadow IT and the associated risks.
A serious vulnerability rated at 9.2 out of 10 is currently being exploited in Citrix NetScaler ADC. It allows attackers to gain access to the entire network when the device is configured as a gateway. Very dangerous! Patch as soon as possible.
Researchers found many bugs in printer systems. Brother is the one with the most bugs by far. Some are patchable and at least one very serious bug is not patchable. What will be done remains to be seen.
Microsoft Exchange servers are a popular target of cyberattackers and they have been hit again. Keyloggers that record all keystrokes infected the servers to steal credentials.
SIM (Subscriber Identity Module) swap is a technique where a cybercriminal convinces a mobile carrier to transfer an existing mobile number to a new SIM in a new device. That new SIM and device then get all the calls and texts intended for the original owner. It can be very difficult to convince a carrier that you are the real owner and to transfer the number back to you.