Contact Us
Error: Contact form not found.
Contact Us
Error: Contact form not found.
Client Login
Select a platform below to log in

The cloud-based software-as-a-service (SaaS) company CDK Global who provides services to car dealerships was targeted in a ransomware attack.

One of the most common medium-risk vulnerabilities we find is the “Missing httpOnly Cookie Attribute” vulnerability.

TraceSecurity is starting off the new year with the launch of a new and exciting service to address cybersecurity threats like never before.

If a DNS server is not configured properly, the information cache becomes accessible. An attacker can use a DNS cache snooping attack.

A new technique being used in social engineering attacks is what’s known as speech synthesis. It is becoming a popular method of attack.

Social engineering continues to be the largest threat to the cybersecurity of organizations. Phishing campaigns are powerful and common.

Microsoft identified a Printer Spooler vulnerability. It has been nicknamed the PrintNightmare because it gains access to critical devices.