All set for the weekend? Not so fast. Yesterday, BleepingComputer summed up all the log4j and logback CVEs known thus far. Ever since the critical log4j zero-day saga started...
The Cybersecurity and Infrastructure Security Agency order comes as a prominent firm says nation states are exploiting the vulnerabilities. Federal agencies have until 5 pm on...
How to get the most out of your PSIRT investment The Product Security Incident Response Team (PSIRT) is not a firefighter team, but they should be...
Retail organizations are different. While they don’t have the compliance requirements of a bank or the large amount of sensitive data that healthcare has, they must...
Four affiliated online sports gear sites have disclosed a cyberattack where threat actors stole credit cards for 1,813,224 customers. While not much is known about the...
CISA has asked VMware admins and users today to patch a critical security vulnerability found in the Workspace ONE UEM console that threat actors could abuse...
Hellmann Worldwide is warning customers of an increase in fraudulent calls and emails regarding payment transfer and bank account changes after a recent ransomware attack. The...
An information technology system security breach detected late last month prompted the Virginia Museum of Fine Arts to shut down its website for a state investigation,...
Ermetic, a Palo Alto, CA- and Tel Aviv, Israel-based cloud infrastructure security company, closed a $70M Series B financing. The round was led by Qumra Capital...
Threat Actors Have Switched from LDAP Callback URLs to RMI in Order to Increase Their Chances of Success. These past few days have been about the...