Technology consolidates Windows and Linux software risk together in one UI, helping teams manage vulnerabilities and comply with new regulatory standards.
Read moreLacework Extends CNAPP Capabilities With Attack Path Analysis and Agentless Workload Scanning
November 10 2022Greater insight into attack paths and runtime visibility helps customers reduce risk and improve cloud security posture.
Read moreUnderstanding the Rise of Risk-Based Vulnerability Management
November 10 2022Risk-based vulnerability management solutions foster the convergence of risk management and vulnerability management. Andrew Braunberg explains what’s driving the emergence of RBVM.
Read moreMalicious Python Package Relies on Steganography to Download Malware
November 10 2022The malicious package downloads an image from the Web, then uses a steganography module to extract and execute the code to download malware.
Read moreHole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.
Read moreCyberattackers like IPFS because it is resilient to content blocking and takedown efforts.
Read moreHow US Businesses Suffer From the Lack of Personal Data Privacy Laws
November 10 2022The stalling of federal legislation and the continued expansion of data brokers are fueling a phishing epidemic.
Read moreLong Island Midterm Votes Delayed Due to Cyberattack Aftereffects
November 10 2022Suffolk County had to hand deliver voting databases with ballot results to the county election headquarters.
Read moreMassachusetts Attorney General announced settlements across multiple states for damages from Experian's 2012 and 2015 breaches that violated consumer protection and notification laws.
Read more
Recent Comments