When printing got dangerous: A PrintNightmare

When printing got dangerous: A PrintNightmare

ESET offers product configuration tips to keep you safe from PrintNightmare exploits while retaining functional network printingPatches for Windows Print Spooler are out, yet problems seem to persist As news trickles out about the recent out-of-band security patch for...
How Zoom moved toward end-to-end encryption

How Zoom moved toward end-to-end encryption

Zoom’s presentation at RSA Conference 2021 focused on end-to-end encryption in Zoom Cloud Meetings. The company explained why its developers are focusing on the issue, how they plan to make calls more secure, and what other new, security-related features users can...
Growth of SaaS Opportunities, things you should know

Growth of SaaS Opportunities, things you should know

There is Exponential SaaS Industry Growth Software as a Service (SaaS) has become a critical part of everyday business. The COVID-19 pandemic has accelerated the move from on-premises software to SaaS. Today 71% of organizations are deploying SaaS applications to...
Why DAST is the perfect fit for agile software projects

Why DAST is the perfect fit for agile software projects

Every software development project is a delicate balancing act. To deliver the full project scope on schedule and within budget is challenging enough – but when you also have to make your application secure, you are now juggling four plates. Let’s see how a modern...
Excel 4.0 Macro: Old Feature, New Attack Technique

Excel 4.0 Macro: Old Feature, New Attack Technique

Excel 4.0 macro, also known as XLM 4.0 macro, is a benign record-and-playback feature of Microsoft Excel that was introduced back in 1992. This piece of programming code is a solution to automating repetitive tasks in Excel, but unfortunately, also a covert backdoor...