Adapting to the Post-SolarWinds Era: Supply Chain Security in 2024
Three years after the SolarWinds attack, new revelations show more must be done to help prevent such a drastic security…
Three years after the SolarWinds attack, new revelations show more must be done to help prevent such a drastic security…
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Zoom's Vulnerability Impact Scoring System calculates the impact of a vulnerability to assign a cash payout for bugs, leading hackers…
Iranian officials blame a software issue for the "disruption" to gasoline pumps.
Attackers can spoof millions of email addresses to create targeted phishing attacks using flaws in Microsoft, GTX, and Cisco Secure…
If you are in the market for a smartphone but want to break away from the Apple-Google duopoly, look no…
CVE-2023-50164 is harder to exploit than the 2017 Struts bug behind the massive breach at Equifax, but don't underestimate the…
AI will make Meta's smart glasses more attractive for consumers. But can the company straddle cutting-edge functionality and responsible data…
Xeol's technology secures an organization’s end-of-life software.
Bug hunter programs can help organizations foster third-party discovery and reporting of issues and vulnerabilities specific to AI systems.