Monitoring Changes in KEV List Can Guide Security Teams Posted on August 7, 2024 The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
Why Godzilla Has Returned, Cuter Than Ever News Godzilla is used to towering over cities and lording his… rooter April 11, 2023 1 min read 0
DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed? News Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020)… rooter June 5, 2024 1 min read 0
Citrix fixed a critical flaw in Secure Access Client for Ubuntu News Citrix fixed a critical flaw affecting the Secure Access client… rooter July 12, 2023 1 min read 0
The AI Ghost in the Machine Fired Him. Then It Gave Him a New Life News After an algorithm ended his career, Mark Quinn, 45, hired… rooter July 19, 2025 1 min read 0