U.S. is the top generator of anonymous open source contributions Security Staff December 4, 2024 A new report has revealed the United States and Russia are the highest generators of open source projects. Read More
Cyber agencies reveal top 15 routinely exploited vulnerabilities Security Staff November 25, 2024 Cybersecurity agencies from five countries collaborated on an advisory regarding Common Vulnerabilities and Exposures (CVEs) routinely exploited in 2023. Read More
New macOS vulnerability allows unauthorized data access Jordyn Alger October 24, 2024 A new macOS vulnerability could allow a malicious actor to evade an operating system’s Transparency, Consent, and Control (TCC) technology. Read More
SolarWinds Help Desk software vulnerability added to CISA catalogue Jordyn Alger October 21, 2024 Due to evidence of active exploitation, CISA added three vulnerabilities to its Known Exploited Vulnerabilities Catalogue.Read More
38% of organizations are at risk of critical exposures Jordyn Alger October 15, 2024 38% of organizations are at risk of critical exposures due to a combination of security shortfalls. Read More
Security leaders discuss the new vulnerability added to CISA’s catalog Jordyn Alger October 8, 2024 CISA has issued a warning regarding a known, exploited vulnerability.Read More
Configuration flaw puts ServiceNow Knowledge Base articles at risk Jordyn Alger September 20, 2024 More than 1,000 ServiceNow Knowledge Base articles were found to be misconfigured. Read More
GitLab releases security updates to fix 17 vulnerabilities Jordyn Alger September 17, 2024 GitLab releases a security update for a critical flaw. Security leaders share advice on how organizations can secure against this vulnerability. Read More
Progress Software issues fix for maximum severity vulnerability Jordyn Alger September 11, 2024 Security leaders discuss the maximum severity vulnerability in Progress Software products. Read More
VMware ESXi flaw leveraged by BlackByte ransomware Jordyn Alger September 3, 2024 Recent investigations reveal that the BlackByte ransomware group is deploying techniques that vary from its typical methods.Read More