6 Ways you can Proactively Secure Your organization’s Mobile Endpoints
Over the years, mobile devices like smartphones, tablets, and laptops have been extensively used to get work done, primarily due to these powerful devices facilitating mobility for workforces.
Workplace trends from 2022 show that...
Pwn2Own Automotive : Critical Vulnerabilities Discovered In AC Charging Controller
Critical vulnerabilities in Phoenix Contact CHARX SEC-3100 have been found, giving attackers the ability to run arbitrary code and disclose confidential information on devices with compromised installations.
Notably, these vulnerabilities were discovered as part of...