article thumbnail

Did Huawei Eavesdrop on KPN Mobile Network?

Data Breach Today

KPN Disputes Reported Surveillance Risk to Users, Who Included Dutch Prime Minister A bombshell news report suggests that Dutch mobile network provider KPN in 2010 didn't know if one of its major equipment suppliers - China's Huawei - was spying on users.

Risk 290
article thumbnail

Sharepoint: IT doesn't kill businesses, people do

Collaboration 2.0

Sharepoint 2010 is now a credible platform player for collaboration and business social networking. The larger challenge: Changing user perceptions of what the tools are for, and what you can do with them.

IT 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Over 61% of Exchange servers vulnerable to CVE-2020-0688 attacks

Security Affairs

Rapid7 reported that 87% of almost 138,000 Exchange 2016 servers and 77% of around 25,000 Exchange 2019 servers are still vulnerable to CVE-2020-0688 attacks, and roughly 54,000 Exchange 2010 servers have not been updated in six years. After Microsoft addressed the flaw experts reportedly observed that APT actors exploiting the flaw.

article thumbnail

NATO Chief calls for a new strategic to address new challenges

Security Affairs

. “My thought is that the existing Strategic Concept, which we agreed in 2010, has served NATO well. Having said that, I think we all have to realise that since we agreed the Strategic Concept back in 2010, the world has fundamentally changed.” And it has actually served us well for many years.

Military 314
article thumbnail

How to Create Unique Customer Journeys to Optimize Business Outcomes

Speaker: Shawn Phillips, CCXP, Head of Growth and Innovation

A one-size-fits-all approach is a great approach – if it’s 2010. With the growth of AI, customers expect – and often demand – a customer journey based on their unique needs and history with your brand.

article thumbnail

REMnux 7, a Linux toolkit for malware analysts released

Security Affairs

The toolkit was first released in 2010 by SANS fellow researcher Lenny Zeltser , who is still maintaining the software. REMnux is a Linux toolkit for reverse-engineering and dissecting software, it includes a collection of free tools created by the community that allows researchers to investigate malware.

IT 363
article thumbnail

CISA shares a catalog of 306 actively exploited vulnerabilities

Security Affairs

The oldest vulnerability included in the catalog is the CVE-2010-5326? RCE in SAP NetWeaver Application Server and dates back to 2010. The catalog includes vulnerabilities for products from Adobe, Apple, Atlassian, Cisco, Google, IBM, Microsoft, Nagios, Netgear, Oracle, Pulse Secure, and many other companies.