CSAF Is the Future of Vulnerability Management
December 15 2022Version 2.0 of the Common Security Advisory Framework will enable organizations to automate vulnerability remediation.
Read moreVersion 2.0 of the Common Security Advisory Framework will enable organizations to automate vulnerability remediation.
Read moreWithout many details, Apple patches a vulnerability that has been exploited in the wild to execute code.
Read moreMicrosoft has released its final monthly batch of security updates for 2022, fixing more than four dozen security holes in its various Windows operating systems and related software. The...
Read moreMicrosoft has released its final monthly batch of security updates for 2022, fixing more than four dozen security holes in its various Windows operating systems and related software. The...
Read moreFormer pure-play deception startup Illusive attracts Proofpoint with its repositioned platform focusing on identity threat detection and response (ITDR).
Read moreThe proliferation of automated cyberattacks against npm, NuGet, and PyPI underscores the growing sophistication of threat actors and the threats to open source software supply chains.
Read moreLearn to think three moves ahead of hackers so you're playing chess, not checkers. Instead of reacting to opponents' moves, be strategic, and disrupt expected patterns of vulnerability.
Read moreAn emerging cybercriminal group linked with Conti has expanded its partial encryption strategy and demonstrates other evasive maneuvers, as it takes aim at healthcare and other sectors.
Read moreAiming to give threat hunters a list of popular attack tactics, a cybersecurity team analyzed collections of real-world threat data to find attackers' most popular techniques.
Read moreInteresting discussion of vulnerabilities and exploits against Boston’s CharlieCard.
Read more
Recent Comments