Welcome to the TechAssure eRiskHub®
This resource, provided by TechAssure Association, is available to customers of TechAssure Member Firms. For more information about TechAssure, see www.TechAssure.com.
You must be a registered user to access the eRiskHub.
If you are already registered, enter your Username and Password in Login box in the upper right corner of this screen.
If this is your first time here, please click on the image immediately to the right and register for the site.
Note: You must have a valid Access Code in order to complete your registration. You should have received an Access Code with your policy. If you do not have an Access Code, please contact your agent. If you have an Access Code, but are experiencing difficulties registering or logging in, please contact contact us.
Bleeping Computer
-
Critical flaw in Protobuf library enables JavaScript code executi...04/18/2026Proof-of-concept exploit code has been published for a critical remote code execution flaw in protob...
-
Microsoft Teams right-click paste broken by Edge update bug04/18/2026Microsoft is warning that a recent Microsoft Edge browser update introduced a bug that breaks right-...
-
NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9, ...04/18/2026NAKIVO Inc. announced the general availability of NAKIVO Backup & Replication v11.2, focused on ...
-
Payouts King ransomware uses QEMU VMs to bypass endpoint security04/17/2026The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtu...
-
Grinex exchange blames "Western intelligence" for $13.7M crypto h...04/17/2026Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7...
-
Inside an Underground Guide: How Threat Actors Vet Stolen Credit ...04/17/2026In cybercrime markets, trust isn't assumed, it's verified. Flare reveals how underground guides teac...
-
Webinar: From phishing to fallout — Why MSPs must rethink both ...04/17/2026Cyberattacks are evolving faster than many MSP and corporate defenses can keep up, with phishing dri...
Dark Reading
Data Breach News
