Monitoring Changes in KEV List Can Guide Security Teams Posted on August 7, 2024 The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
NICKEL TAPESTRY étend ses activités basées sur des employés IT malveillants News Le programme nord-coréen impliquant des opérateurs IT s'étend pour inclure… rooter June 17, 2025 1 min read 0
The Role of Trust Anchors in Modern IT Security News To fully realize the benefits trust anchors provide, organizations need… rooter September 5, 2024 1 min read 0
Leaky DICOM Medical Standard Exposes Millions of Patient Records News A 30-year-old, rarely updated protocol for medical devices has exposed… rooter November 21, 2023 1 min read 0
SpaceX, Palantir, and OpenAI Reportedly Teaming Up to Score Some Sweet, Sweet Defense Contractor Cash News Oh yeah, Palmer Luckey's in the mix too. rooter December 23, 2024 1 min read 0