VMware updated a security advisory published two weeks ago to warn customers that a now-patched critical vulnerability allowing remote code...
The board responsible for overseeing the CVE vulnerability identification program has criticized the DWF project for publishing what it says are “unauthorized” CVE records. The Common Vulnerabilities...
The increased sophistication of voice-enabled smart speakers, combined with the rise of online meeting technologies such as Zoom has created an increasing and often overlooked IoT...
Samsung is working on patching multiple vulnerabilities affecting its mobile devices that could be used for spying or to take full control of the system. The...
JBS, the world’s largest beef producer, has confirmed that they paid an $11 million ransom after the REvil ransomware operation initially demanded $22.5 million. On May...
Looking to avoid a supply chain hack like Sunburst? CrowdStrike CTO Mike Sentonas says Zero Trust is key. In the spirit of building a solid foundation,...
Enterprise security professionals face a difficult task. The growth of the cybersecurity market has led to increased clutter and overwhelming fragmentation. A new survey of more than...
A new executive order revokes bans on WeChat and TikTok but retains and adds to a Trump edict on U.S. tech, especially “connected software applications” tied...
A new task force would examine issues that surfaced during the pandemic, including semiconductor shortages. The Biden administration Tuesday released recommendations following a 100-day review of...
Nearly half (48%) of organizations do not have a user verification policy in place for password reset calls to IT service desks, according to a new Specops Software survey,...
Panaseer announced guidance on best practice cybersecurity measurements to help avoid incidents. Currently, there is limited industry guidance around the most important metrics to evaluate, and how...
Recent Comments