A cybersecurity specialist from the watchdog is ready to dive into related policy implications, but says work on agencies’ implementation is the more immediate concern. Organizations...
A dangerous bug in Cacti, the RRDTool frontend and performance/fault management framework, potentially allowed attackers to run arbitrary PHP commands on the server. Cacti is a popular...
A researcher has disclosed a technique that bypassed Akamai web application firewalls (WAF) running Spring Boot, potentially leading to remote code execution (RCE). Akamai’s WAF, which was...
Bug bounty hunters are increasingly unearthing cloud-based vulnerabilities as organizations undergo ‘digital transformation’, a new report has found. Researchers have uncovered more than 65,000 software vulnerabilities...
Fortinet urges customers to patch their appliances against an actively exploited FortiOS SSL-VPN vulnerability that could allow unauthenticated remote code execution on devices. The security flaw is...
The bill would require an annual report to Congress from the Office of Management and Budget with the goal of identifying funding needed for agencies’ transition...
Alongside the release of hacking tools and a thought-provoking keynote, there was plenty on offer for web security professionals among the briefings at Black Hat Europe last week. Vulnerability...
Tools to enable the work of security researchers, pen testers, and bug bounty hunters were demonstrated at this year’s Black Hat Europe conference, held at London’s Excel Centre...
Discussion of potential changes centered on a need for software transparency and independent supply-chain assessments. Regulators are exploring how to update critical infrastructure protection—or CIP—standards in...
Several Democrats on the House Intelligence Committee sent a letter to Twitter CEO Elon Musk expressing national security concerns about reports that Beijing launched an information...
Recent Comments