Blog
Our Insights
Apple emergency update fixes zero-day used to hack Macs, Watches
Apple has released security updates to address a zero-day vulnerability that threat actors can exploit in attacks targeting Macs and […]
Read More >>
Benefits of Cloud-Based Mobile Applications: Creating Secure Mobile Applications with ResultWorx Technology Solutions
We are all familiar with the term “Cloud Security,” yet only a little over 50% of companies worldwide operate their […]
Read More >>
Windows admins frustrated by Quick Assist moving to Microsoft Store
Windows admins have been expressing their dismay at Microsoft’s decision to move the Quick Assist remote assistance tool to the […]
Read More >>
HP fixes bug letting attackers overwrite firmware in over 200 models
HP has released BIOS updates today to fix two high-severity vulnerabilities affecting a wide range of PC and notebook products, […]
Read More >>
Windows 11 to show suggested actions when copying data to the clipboard
Microsoft is testing a new ‘Suggested Actions’ feature in Windows 11 Dev builds where the operating system suggests actions you […]
Read More >>
Microsoft May 2022 Patch Tuesday fixes 3 zero-days, 75 flaws
Today is Microsoft's May 2022 Patch Tuesday, and with it comes fixes for three zero-day vulnerabilities, with one actively exploited, and a total of 75 flaws.
Read More >>
A US charity leaves private images of website users exposed
The Safety Detectives cybersecurity team discovered 150 GB of exposed data in the bucket with over 50,000 user avatars. Two […]
Read More >>
New Raspberry Robin worm uses Windows Installer to drop malware
Red Canary intelligence analysts have discovered a new Windows malware with worm capabilities that spreads using external USB drives. This […]
Read More >>
Microsoft Defender for Business stand-alone now generally available
Microsoft says that its enterprise-grade endpoint security for small to medium-sized businesses is now generally available as a standalone solution. Known as Microsoft Defender […]
Read More >>
New phishing warns: Your verified Twitter account may be at risk
Phishing emails increasingly target verified Twitter accounts with emails designed to steal their account credentials, as shown by numerous ongoing […]
Read More >>