New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.
Read moreSecurity Risks of New .zip and .mov Domains
May 19 2023Researchers are worried about Google’s .zip and .mov domains, because they are confusing. Mistaking a URL for a filename could be a security vulnerability.
Read more85% of AppSec pros say ability to differentiate between real risks and noise is critical, yet only 38% can do so today; mature DevOps organizations cite widespread impact due...
Read moreAll Apple users have zero-days that need patching, though some have more zero-days than others.
Read moreAs enterprises adopt multicloud, the security picture has gotten foggy. Cloud workload protection platforms and distributed firewalls are creating clarity.
Read moreKeePass Vulnerability Imperils Master Passwords
May 19 2023A newly discovered bug in the open source password manager, if exploited, lets attackers retrieve a target's master password — and proof-of-concept code is available.
Read morePlug X and other information-stealing remote-access Trojans are among the malware targeting networking, manufacturing, and logistics companies in Taiwan.
Read more10 Types of AI Attacks CISOs Should Track
May 19 2023Risk from artificial intelligence vectors presents a growing concern among security professionals in 2023.
Read moreCybercrime group that often uses smishing for initial access bypassed traditional OS targeting and evasion techniques to directly gain access to the cloud.
Read moreSecurity by design can't be just a best practice — it has to become a fundamental part of software development.
Read more
Recent Comments