
MITRE CVE database saved after last minute reversal
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
The US government is extending funding for the Common Vulnerabilities and Exposures (CVE) database by eleven ...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Securing $8.7 million (€8.5 million) in seed capital, DryRun Security introduces Natural Language Code Poli...
The ChatGPT crawler vulnerability in the ChatGPT API enables DDoS attacks on websites. German security resear...
The largest distributed denial-of-service (DDoS) attack peaked at 5.6 terabits per second and was carried out...
Energy companies see cybersecurity as the biggest risk to their business. Two-thirds of energy professionals ...
A new variant of the infamous Mirai malware has been discovered. Murdoc_Botnet targets AVTech cameras and Hua...
Hewlett Packard Enterprise (HPE) is investigating claims of an intrusion after IntelBroker claimed to have st...
AI assistants make mistakes just like humans, and they may require extra care and attention. Prompt Security ...
Paris-based HarfangLab wants to differentiate itself from its endpoint security rivals. CSO Anouck Teiller ex...
Russian state hacker Star Blizzard is conducting a new spear-phishing campaign. The goal is to compromise Wha...