Cloud, Containers, Orchestration Big Factors in BSIMM9
A converged architecture that brings independent software vendors, cloud vendors and IoT vendors together is reshaping the security landscape. Go to Source
A converged architecture that brings independent software vendors, cloud vendors and IoT vendors together is reshaping the security landscape. Go to Source
Supply-chain attacks are on the rise, but machine learning provides the edge that the security industry needs to keep up. Go to Source
Experts say Friday’s breach remains a dangerous potential access point to even more third-party apps and websites. Go to Source
Attractive to both white-hats and cybercriminals, AI’s role in security has yet to find an equilibrium between the two sides. Go to Source
Foxit Software has patched over 100 vulnerabilities in its popular Foxit PDF Reader. Many of the bugs tackled by the company include a wide array of high severity remote code execution vulnerabilities. Foxit on Friday… Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws
The relationship between the malware and the APT group remains somewhat murky. Go to Source
The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices. Go to Source
The free online office suite software is used by more than 30 million people and is a ripe target for criminals. Go to Source
Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process. Go to Source
The update includes a security bypass bug that enables privilege escalation. Go to Source