The vulnerabilities may already be under active attack, Apple says in an advisory.
Read morePlanning Our Passwordless Future
May 4 2021All the talk that passwords could one day go away seemed too good to be true, yet the scales are finally started to tip to a passwordless reality. (Part...
Read moreHardware maker has issued an update to fix multiple critical privilege escalation vulnerabilities that have gone undetected since 2009.
Read moreSPONSORED CONTENT. While organizations may be more vulnerable than ever to supply chain hacks and ransomware, they can look to Zero Trust frameworks to keep their users and data...
Read moreMeasures of programming speed, security, and automation have all significantly increased in the past year, GitLab's latest survey finds.
Read moreScripps Health Responds to Cyberattack
May 4 2021The health care system says it has suspended access to patient portals and other applications related to operations at Scripps facilities.
Read moreBy focusing on protection instead of detection, organizations can defend against targeted attacks without compromising security or productivity.
Read moreIt’s Time to Ditch Celebrity Cybersecurity
May 4 2021High-profile attacks and solutions are shiny objects that can distract from the defenses that afford the greatest protection.
Read moreIncident responders who investigate attacks targeting Active Directory discuss methods used to gain entry, elevate privileges, and control target systems.
Read more
Recent Comments