Tag: The Register – Security

Two years on, 1 in 4 apps still vulnerable to Log4Shell

Lack of awareness still blamed for patching apathy despite it being among most infamous bugs of all time Two years after the Log4Shell vulnerability in the open source Java-based Log4j logging utility was disclosed, circa one in four applications are…

Read the clouds, reduce the cyber risk

Why a one-size- fits- all approach to cloud security is unlikely to work in multi-cloud deployments Webinar  In the natural world, there are ten different kinds of cloud – a rare simplicity in meteorological terms. But in our global business…

US and EU infosec authorities pen intel-sharing pact

As Cyber Solidarity Act edges closer to full adoption in Europe The US Cybersecurity and Infrastructure Security Agency (CISA) has signed a working arrangement with its EU counterparts to increase cross-border information sharing and more to tackle criminals.… This article…

Apple and some Linux distros are open to Bluetooth attack

Issue has been around since at least 2012 A years-old Bluetooth authentication bypass vulnerability allows miscreants to connect to Apple, Android and Linux devices and inject keystrokes to run arbitrary commands, according to a software engineer at drone technology firm…

Locking down the edge

Watch this webinar to find out how Zero Trust fits into the edge security ecosystem Sponsored Post  Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed…