Researchers Release Details of New RCE Exploit Chain for SharePoint One of the already-patched flaws enables elevation of privilege, while the other enables remote code execution.
QR Code 101: What the Threats Look Like Because QR codes can be used for phishing as easily as an email or text can, organizations must remain vigilant when dealing with them.
LATEST FROM DR TECHNOLOGY
7 Ways SMBs Can Secure Their WordPress Sites This Tech Tip outlines seven easy fixes small and midsize businesses can use to prevent the seven most common WordPress vulnerabilities.
Q&A: UK Ambassador on Creating New Cybersecurity Agencies Around the World How the UK is assisting other nations in forming their own versions of a National Centre for Cybersecurity (NCSC).