
MITRE CVE database saved after last minute reversal
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Last October, media outlets wrote about a new third-party tool called Flyby11. That one allows users to bypas...
Cyber attacks increasingly focus on influence operations and disinformation campaigns rather than direct infr...
Meta has established new rules under which it will never disclose internally developed, potentially (very) hi...
Web apps are a popular attack path for cybercriminals. Qualys wants to help organizations secure applications...
Those looking for an AI tool to facilitate illegal activities might want to turn to DeepSeek. Experts have sh...
In 2024, Google took several measures to improve the security of the Android and Google Play ecosystem. These...
Microsoft is going to discontinue the free VPN feature in MS Defender within Microsoft 365 Personal and Famil...
Organizations are rapidly embracing digital transformation, with the public cloud and containers as key strat...
Attacks via browser extensions have been possible for a while. New research now reveals a method by which mal...